Documentation ¶
Index ¶
- Constants
- Variables
- func GetSSZRootNoError(obj ssz.HashRoot) string
- func NewTestingKeyManager() *testingKeyManager
- func NewTestingKeyManagerWithSlashableRoots(slashableDataRoots [][]byte) *testingKeyManager
- func NewTestingQBFTController(identifier []byte, share *types.Share, config qbft.IConfig) *qbft.Controller
- func NewTestingStorage() *testingStorage
- func NewTestingTimer() qbft.Timer
- func TestingCommitMessageWithHeightIdentifierAndFullData(sk *bls.SecretKey, id types.OperatorID, height qbft.Height, ...) *qbft.SignedMessage
- func TestingCommitMultiSignerMessageWithHeightIdentifierAndFullData(sks []*bls.SecretKey, ids []types.OperatorID, height qbft.Height, ...) *qbft.SignedMessage
- func TestingProposalMessageWithIdentifierAndFullData(sk *bls.SecretKey, id types.OperatorID, identifier, fullData []byte, ...) *qbft.SignedMessage
- func UnknownDutyValueCheck() qbft.ProposedValueCheckF
- type TestKeySet
- type TestQBFTTimer
- type TestingBeaconNode
- func (bn *TestingBeaconNode) DomainData(epoch phase0.Epoch, domain phase0.DomainType) (phase0.Domain, error)
- func (bn *TestingBeaconNode) GetAttestationData(slot phase0.Slot, committeeIndex phase0.CommitteeIndex) (ssz.Marshaler, spec.DataVersion, error)
- func (bn *TestingBeaconNode) GetBeaconBlock(slot phase0.Slot, graffiti, randao []byte) (ssz.Marshaler, spec.DataVersion, error)
- func (bn *TestingBeaconNode) GetBeaconNetwork() types.BeaconNetwork
- func (bn *TestingBeaconNode) GetBlindedBeaconBlock(slot phase0.Slot, graffiti, randao []byte) (ssz.Marshaler, spec.DataVersion, error)
- func (bn *TestingBeaconNode) GetSyncCommitteeContribution(slot phase0.Slot, selectionProofs []phase0.BLSSignature, subnetIDs []uint64) (ssz.Marshaler, spec.DataVersion, error)
- func (bn *TestingBeaconNode) GetSyncMessageBlockRoot(slot phase0.Slot) (phase0.Root, spec.DataVersion, error)
- func (bn *TestingBeaconNode) IsSyncCommitteeAggregator(proof []byte) (bool, error)
- func (bn *TestingBeaconNode) SetSyncCommitteeAggregatorRootHexes(roots map[string]bool)
- func (bn *TestingBeaconNode) SubmitAggregateSelectionProof(slot phase0.Slot, committeeIndex phase0.CommitteeIndex, committeeLength uint64, ...) (ssz.Marshaler, spec.DataVersion, error)
- func (bn *TestingBeaconNode) SubmitAttestation(attestation *phase0.Attestation) error
- func (bn *TestingBeaconNode) SubmitBeaconBlock(block *spec.VersionedBeaconBlock, sig phase0.BLSSignature) error
- func (bn *TestingBeaconNode) SubmitBlindedBeaconBlock(block *api.VersionedBlindedBeaconBlock, sig phase0.BLSSignature) error
- func (bn *TestingBeaconNode) SubmitSignedAggregateSelectionProof(msg *phase0.SignedAggregateAndProof) error
- func (bn *TestingBeaconNode) SubmitSignedContributionAndProof(contribution *altair.SignedContributionAndProof) error
- func (bn *TestingBeaconNode) SubmitSyncMessage(msg *altair.SyncCommitteeMessage) error
- func (bn *TestingBeaconNode) SubmitValidatorRegistration(pubkey []byte, feeRecipient bellatrix.ExecutionAddress, ...) error
- func (bn *TestingBeaconNode) SubmitVoluntaryExit(voluntaryExit *phase0.SignedVoluntaryExit, sig phase0.BLSSignature) error
- func (bn *TestingBeaconNode) SyncCommitteeSubnetID(index phase0.CommitteeIndex) (uint64, error)
- type TestingNetwork
- type TimerState
Constants ¶
const ( TestingDutySlot = 12 TestingDutySlot2 = 50 TestingDutyEpoch = 0 TestingValidatorIndex = 1 UnknownDutyType = 100 )
const ( // ForkEpochPraterCapella Goerli taken from https://github.com/ethereum/execution-specs/blob/37a8f892341eb000e56e962a051a87e05a2e4443/network-upgrades/mainnet-upgrades/shanghai.md?plain=1#L18 ForkEpochPraterCapella = 162304 // TestingDutySlotBellatrix keeping this value to not break the test roots TestingDutySlotBellatrix = 12 TestingDutySlotBellatrixNextEpoch = 50 TestingDutySlotBellatrixInvalid = 50 TestingDutyEpochBellatrix = 0 TestingDutyEpochCapella = ForkEpochPraterCapella TestingDutySlotCapella = ForkEpochPraterCapella * 32 TestingDutySlotCapellaNextEpoch = TestingDutySlotCapella + 32 TestingDutySlotCapellaInvalid = TestingDutySlotCapella + 50 )
Variables ¶
var AggregatorMsgID = func() []byte { ret := types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleAggregator) return ret[:] }()
var AggregatorRunner = func(keySet *TestKeySet) ssv.Runner { return baseRunner(types.BNRoleAggregator, ssv.AggregatorValueCheckF(NewTestingKeyManager(), types.BeaconTestNetwork, TestingValidatorPubKey[:], TestingValidatorIndex), keySet) }
var AttesterMsgID = func() []byte { ret := types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleAttester) return ret[:] }()
var AttesterRunner = func(keySet *TestKeySet) ssv.Runner { return baseRunner(types.BNRoleAttester, ssv.AttesterValueCheckF(NewTestingKeyManager(), types.BeaconTestNetwork, TestingValidatorPubKey[:], TestingValidatorIndex, nil), keySet) }
var AttesterRunner7Operators = func(keySet *TestKeySet) ssv.Runner { return baseRunner(types.BNRoleAttester, ssv.AttesterValueCheckF(NewTestingKeyManager(), types.BeaconTestNetwork, TestingValidatorPubKey[:], TestingValidatorIndex, nil), keySet) }
var BaseInstance = func() *qbft.Instance { return baseInstance(TestingShare(Testing4SharesSet()), Testing4SharesSet(), []byte{1, 2, 3, 4}) }
var BaseValidator = func(keySet *TestKeySet) *ssv.Validator { return ssv.NewValidator( NewTestingNetwork(), NewTestingBeaconNode(), TestingShare(keySet), NewTestingKeyManager(), map[types.BeaconRole]ssv.Runner{ types.BNRoleAttester: AttesterRunner(keySet), types.BNRoleProposer: ProposerRunner(keySet), types.BNRoleAggregator: AggregatorRunner(keySet), types.BNRoleSyncCommittee: SyncCommitteeRunner(keySet), types.BNRoleSyncCommitteeContribution: SyncCommitteeContributionRunner(keySet), }, ) }
var DecidedRunner = func(keySet *TestKeySet) ssv.Runner { return decideRunner(TestAttesterConsensusData, qbft.FirstHeight, keySet) }
var DecidedRunnerUnknownDutyType = func(keySet *TestKeySet) ssv.Runner { return decideRunner(TestConsensusUnkownDutyTypeData, qbft.FirstHeight, keySet) }
var DecidedRunnerWithHeight = func(height qbft.Height, keySet *TestKeySet) ssv.Runner { return decideRunner(TestAttesterConsensusData, height, keySet) }
var DecidingMsgsForHeight = func(consensusData *types.ConsensusData, msgIdentifier []byte, height qbft.Height, keySet *TestKeySet) []*qbft.SignedMessage { byts, _ := consensusData.Encode() r, _ := qbft.HashDataRoot(byts) fullData, _ := consensusData.MarshalSSZ() return DecidingMsgsForHeightWithRoot(r, fullData, msgIdentifier, height, keySet) }
//////////////////// For QBFT TESTS /////////////////////////////////////////////////////////////////////////
var DecidingMsgsForHeightWithRoot = func(root [32]byte, fullData, msgIdentifier []byte, height qbft.Height, keySet *TestKeySet) []*qbft.SignedMessage { msgs := make([]*qbft.SignedMessage, 0) for h := qbft.FirstHeight; h <= height; h++ { s := SignQBFTMsg(keySet.Shares[1], 1, &qbft.Message{ MsgType: qbft.ProposalMsgType, Height: h, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, }) s.FullData = fullData msgs = append(msgs, s) for i := uint64(1); i <= keySet.Threshold; i++ { msgs = append(msgs, SignQBFTMsg(keySet.Shares[types.OperatorID(i)], types.OperatorID(i), &qbft.Message{ MsgType: qbft.PrepareMsgType, Height: h, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, })) } for i := uint64(1); i <= keySet.Threshold; i++ { msgs = append(msgs, SignQBFTMsg(keySet.Shares[types.OperatorID(i)], types.OperatorID(i), &qbft.Message{ MsgType: qbft.CommitMsgType, Height: h, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, })) } } return msgs }
var DifferentFullData = append(TestingQBFTFullData, []byte("different")...)
var DifferentRoot = func() [32]byte { return sha256.Sum256(DifferentFullData) }()
var ExpectedDecidingMsgsForHeight = func(consensusData *types.ConsensusData, msgIdentifier []byte, height qbft.Height, keySet *TestKeySet) []*qbft.SignedMessage { byts, _ := consensusData.Encode() r, _ := qbft.HashDataRoot(byts) fullData, _ := consensusData.MarshalSSZ() return ExpectedDecidingMsgsForHeightWithRoot(r, fullData, msgIdentifier, height, keySet) }
var ExpectedDecidingMsgsForHeightWithRoot = func(root [32]byte, fullData, msgIdentifier []byte, height qbft.Height, keySet *TestKeySet) []*qbft.SignedMessage { msgs := make([]*qbft.SignedMessage, 0) for h := qbft.FirstHeight; h <= height; h++ { s := SignQBFTMsg(keySet.Shares[1], 1, &qbft.Message{ MsgType: qbft.ProposalMsgType, Height: h, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, }) s.FullData = fullData msgs = append(msgs, s) for i := uint64(1); i <= keySet.Threshold; i++ { msgs = append(msgs, SignQBFTMsg(keySet.Shares[types.OperatorID(i)], types.OperatorID(i), &qbft.Message{ MsgType: qbft.PrepareMsgType, Height: h, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, })) } for i := uint64(1); i <= keySet.Threshold; i++ { msgs = append(msgs, SignQBFTMsg(keySet.Shares[types.OperatorID(i)], types.OperatorID(i), &qbft.Message{ MsgType: qbft.CommitMsgType, Height: h, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, })) } } return msgs }
var ExpectedSSVDecidingMsgsV = func(consensusData *types.ConsensusData, ks *TestKeySet, role types.BeaconRole) []*types.SSVMessage { id := types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], role) ssvMsgF := func(qbftMsg *qbft.SignedMessage, partialSigMsg *types.SignedPartialSignatureMessage) *types.SSVMessage { var byts []byte var msgType types.MsgType if partialSigMsg != nil { msgType = types.SSVPartialSignatureMsgType byts, _ = partialSigMsg.Encode() } else { msgType = types.SSVConsensusMsgType byts, _ = qbftMsg.Encode() } return &types.SSVMessage{ MsgType: msgType, MsgID: id, Data: byts, } } base := make([]*types.SSVMessage, 0) if role == types.BNRoleProposer { for i := uint64(1); i <= ks.Threshold; i++ { base = append(base, ssvMsgF(nil, PreConsensusRandaoMsgV(ks.Shares[types.OperatorID(i)], types.OperatorID(i), consensusData.Version))) } } if role == types.BNRoleAggregator { for i := uint64(1); i <= ks.Threshold; i++ { base = append(base, ssvMsgF(nil, PreConsensusSelectionProofMsg(ks.Shares[types.OperatorID(i)], ks.Shares[types.OperatorID(i)], types.OperatorID(i), types.OperatorID(i)))) } } if role == types.BNRoleSyncCommitteeContribution { for i := uint64(1); i <= ks.Threshold; i++ { base = append(base, ssvMsgF(nil, PreConsensusContributionProofMsg(ks.Shares[types.OperatorID(i)], ks.Shares[types.OperatorID(i)], types.OperatorID(i), types.OperatorID(i)))) } } qbftMsgs := SSVExpectedDecidingMsgsForHeight(consensusData, id[:], qbft.Height(consensusData.Duty.Slot), ks) for _, msg := range qbftMsgs { base = append(base, ssvMsgF(msg, nil)) } return base }
var MarshalJustifications = func(msgs []*qbft.SignedMessage) [][]byte { bytes, err := qbft.MarshalJustifications(msgs) if err != nil { panic(err) } return bytes }
var MultiSignQBFTMsg = func(sks []*bls.SecretKey, ids []types.OperatorID, msg *qbft.Message) *qbft.SignedMessage { if len(sks) == 0 || len(ids) != len(sks) { panic("sks != ids") } var signed *qbft.SignedMessage for i, sk := range sks { if signed == nil { signed = SignQBFTMsg(sk, ids[i], msg) } else { if err := signed.Aggregate(SignQBFTMsg(sk, ids[i], msg)); err != nil { panic(err.Error()) } } } return signed }
var PostConsensusAggregatorMsg = func(sk *bls.SecretKey, id types.OperatorID) *types.SignedPartialSignatureMessage { return postConsensusAggregatorMsg(sk, id, false, false) }
var PostConsensusAggregatorTooFewRootsMsg = func(sk *bls.SecretKey, id types.OperatorID) *types.SignedPartialSignatureMessage { msg := &types.PartialSignatureMessages{ Type: types.PostConsensusPartialSig, Slot: TestingDutySlot, Messages: []*types.PartialSignatureMessage{}, } sig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, sk.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: sig, Signer: id, } }
var PostConsensusAggregatorTooManyRootsMsg = func(sk *bls.SecretKey, id types.OperatorID) *types.SignedPartialSignatureMessage { ret := postConsensusAggregatorMsg(sk, id, false, false) ret.Message.Messages = append(ret.Message.Messages, ret.Message.Messages[0]) msg := &types.PartialSignatureMessages{ Type: types.PostConsensusPartialSig, Slot: TestingDutySlot, Messages: ret.Message.Messages, } sig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, sk.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: sig, Signer: id, } }
var PostConsensusAttestationMsg = func(sk *bls.SecretKey, id types.OperatorID, height qbft.Height) *types.SignedPartialSignatureMessage { return postConsensusAttestationMsg(sk, id, height, false, false) }
var PostConsensusAttestationTooFewRootsMsg = func(sk *bls.SecretKey, id types.OperatorID, height qbft.Height) *types.SignedPartialSignatureMessage { msg := &types.PartialSignatureMessages{ Type: types.PostConsensusPartialSig, Slot: TestingDutySlot, Messages: []*types.PartialSignatureMessage{}, } sig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, sk.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: sig, Signer: id, } }
var PostConsensusAttestationTooManyRootsMsg = func(sk *bls.SecretKey, id types.OperatorID, height qbft.Height) *types.SignedPartialSignatureMessage { ret := postConsensusAttestationMsg(sk, id, height, false, false) ret.Message.Messages = append(ret.Message.Messages, ret.Message.Messages[0]) msg := &types.PartialSignatureMessages{ Type: types.PostConsensusPartialSig, Slot: TestingDutySlot, Messages: ret.Message.Messages, } sig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, sk.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: sig, Signer: id, } }
var PostConsensusProposerMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { return postConsensusBeaconBlockMsgV(sk, id, false, false, version) }
var PostConsensusProposerTooFewRootsMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { msg := &types.PartialSignatureMessages{ Type: types.PostConsensusPartialSig, Slot: TestingProposerDutyV(version).Slot, Messages: []*types.PartialSignatureMessage{}, } sig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, sk.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: sig, Signer: id, } }
var PostConsensusProposerTooManyRootsMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { ret := postConsensusBeaconBlockMsgV(sk, id, false, false, version) ret.Message.Messages = append(ret.Message.Messages, ret.Message.Messages[0]) msg := &types.PartialSignatureMessages{ Type: types.PostConsensusPartialSig, Slot: TestingProposerDutyV(version).Slot, Messages: ret.Message.Messages, } sig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, sk.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: sig, Signer: id, } }
var PostConsensusSigAggregatorWrongBeaconSignerMsg = func(sk *bls.SecretKey, id, beaconSigner types.OperatorID) *types.SignedPartialSignatureMessage { ret := postConsensusAggregatorMsg(sk, beaconSigner, false, true) ret.Signer = id return ret }
var PostConsensusSigAttestationWrongBeaconSignerMsg = func(sk *bls.SecretKey, id, beaconSigner types.OperatorID, height qbft.Height) *types.SignedPartialSignatureMessage { ret := postConsensusAttestationMsg(sk, beaconSigner, height, false, true) ret.Signer = id return ret }
var PostConsensusSigProposerWrongBeaconSignerMsgV = func(sk *bls.SecretKey, id, beaconSigner types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { ret := postConsensusBeaconBlockMsgV(sk, beaconSigner, false, true, version) ret.Signer = id return ret }
var PostConsensusSigSyncCommitteeContributionWrongSignerMsg = func(sk *bls.SecretKey, id, beaconSigner types.OperatorID, keySet *TestKeySet) *types.SignedPartialSignatureMessage { ret := postConsensusSyncCommitteeContributionMsg(sk, beaconSigner, TestingValidatorIndex, keySet, false, false, false) ret.Signer = id return ret }
var PostConsensusSigSyncCommitteeWrongBeaconSignerMsg = func(sk *bls.SecretKey, id, beaconSigner types.OperatorID) *types.SignedPartialSignatureMessage { ret := postConsensusSyncCommitteeMsg(sk, beaconSigner, false, true) ret.Signer = id return ret }
var PostConsensusSyncCommitteeContributionMsg = func(sk *bls.SecretKey, id types.OperatorID, keySet *TestKeySet) *types.SignedPartialSignatureMessage { return postConsensusSyncCommitteeContributionMsg(sk, id, TestingValidatorIndex, keySet, false, false, false) }
var PostConsensusSyncCommitteeContributionTooFewRootsMsg = func(sk *bls.SecretKey, id types.OperatorID, keySet *TestKeySet) *types.SignedPartialSignatureMessage { ret := postConsensusSyncCommitteeContributionMsg(sk, id, TestingValidatorIndex, keySet, false, false, false) msg := &types.PartialSignatureMessages{ Type: types.PostConsensusPartialSig, Slot: TestingDutySlot, Messages: ret.Message.Messages[0:2], } sig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, sk.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: sig, Signer: id, } }
var PostConsensusSyncCommitteeContributionTooManyRootsMsg = func(sk *bls.SecretKey, id types.OperatorID, keySet *TestKeySet) *types.SignedPartialSignatureMessage { ret := postConsensusSyncCommitteeContributionMsg(sk, id, TestingValidatorIndex, keySet, false, false, false) ret.Message.Messages = append(ret.Message.Messages, ret.Message.Messages[0]) msg := &types.PartialSignatureMessages{ Type: types.PostConsensusPartialSig, Slot: TestingDutySlot, Messages: ret.Message.Messages, } sig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, sk.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: sig, Signer: id, } }
var PostConsensusSyncCommitteeContributionWrongOrderMsg = func(sk *bls.SecretKey, id types.OperatorID, keySet *TestKeySet) *types.SignedPartialSignatureMessage { return postConsensusSyncCommitteeContributionMsg(sk, id, TestingValidatorIndex, keySet, false, false, true) }
var PostConsensusSyncCommitteeMsg = func(sk *bls.SecretKey, id types.OperatorID) *types.SignedPartialSignatureMessage { return postConsensusSyncCommitteeMsg(sk, id, false, false) }
var PostConsensusSyncCommitteeTooFewRootsMsg = func(sk *bls.SecretKey, id types.OperatorID) *types.SignedPartialSignatureMessage { msg := &types.PartialSignatureMessages{ Type: types.PostConsensusPartialSig, Slot: TestingDutySlot, Messages: []*types.PartialSignatureMessage{}, } sig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, sk.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: sig, Signer: id, } }
var PostConsensusSyncCommitteeTooManyRootsMsg = func(sk *bls.SecretKey, id types.OperatorID) *types.SignedPartialSignatureMessage { ret := postConsensusSyncCommitteeMsg(sk, id, false, false) ret.Message.Messages = append(ret.Message.Messages, ret.Message.Messages[0]) msg := &types.PartialSignatureMessages{ Type: types.PostConsensusPartialSig, Slot: TestingDutySlot, Messages: ret.Message.Messages, } sig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, sk.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: sig, Signer: id, } }
var PostConsensusWrongAggregatorMsg = func(sk *bls.SecretKey, id types.OperatorID) *types.SignedPartialSignatureMessage { return postConsensusAggregatorMsg(sk, id, true, false) }
var PostConsensusWrongAttestationMsg = func(sk *bls.SecretKey, id types.OperatorID, height qbft.Height) *types.SignedPartialSignatureMessage { return postConsensusAttestationMsg(sk, id, height, true, false) }
var PostConsensusWrongProposerMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { return postConsensusBeaconBlockMsgV(sk, id, true, false, version) }
var PostConsensusWrongSigAggregatorMsg = func(sk *bls.SecretKey, id types.OperatorID) *types.SignedPartialSignatureMessage { return postConsensusAggregatorMsg(sk, id, false, true) }
var PostConsensusWrongSigAttestationMsg = func(sk *bls.SecretKey, id types.OperatorID, height qbft.Height) *types.SignedPartialSignatureMessage { return postConsensusAttestationMsg(sk, id, height, false, true) }
var PostConsensusWrongSigProposerMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { return postConsensusBeaconBlockMsgV(sk, id, false, true, version) }
var PostConsensusWrongSigSyncCommitteeContributionMsg = func(sk *bls.SecretKey, id types.OperatorID, keySet *TestKeySet) *types.SignedPartialSignatureMessage { return postConsensusSyncCommitteeContributionMsg(sk, id, TestingValidatorIndex, keySet, false, true, false) }
var PostConsensusWrongSigSyncCommitteeMsg = func(sk *bls.SecretKey, id types.OperatorID) *types.SignedPartialSignatureMessage { return postConsensusSyncCommitteeMsg(sk, id, false, true) }
var PostConsensusWrongSyncCommitteeContributionMsg = func(sk *bls.SecretKey, id types.OperatorID, keySet *TestKeySet) *types.SignedPartialSignatureMessage { return postConsensusSyncCommitteeContributionMsg(sk, id, TestingValidatorIndex, keySet, true, false, false) }
var PostConsensusWrongSyncCommitteeMsg = func(sk *bls.SecretKey, id types.OperatorID) *types.SignedPartialSignatureMessage { return postConsensusSyncCommitteeMsg(sk, id, true, false) }
var PreConsensusContributionProofMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { return PreConsensusCustomSlotContributionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot) }
var PreConsensusContributionProofNextEpochMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { return contributionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot2, TestingDutySlot2, false, false) }
var PreConsensusContributionProofTooFewRootsMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { ret := contributionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot, TestingDutySlot, false, false) msg := &types.PartialSignatureMessages{ Type: types.ContributionProofs, Slot: TestingDutySlot, Messages: ret.Message.Messages[0:2], } msgSig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, beaconSK.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: msgSig, Signer: msgID, } }
var PreConsensusContributionProofTooManyRootsMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { ret := contributionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot, TestingDutySlot, false, false) msg := &types.PartialSignatureMessages{ Type: types.ContributionProofs, Slot: TestingDutySlot, Messages: append(ret.Message.Messages, ret.Message.Messages[0]), } msgSig, _ := NewTestingKeyManager().SignRoot(msg, types.PartialSignatureType, beaconSK.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: *msg, Signature: msgSig, Signer: msgID, } }
var PreConsensusContributionProofWrongBeaconSigMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { return contributionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot, TestingDutySlot+1, false, true) }
var PreConsensusCustomSlotContributionProofMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID, slot phase0.Slot) *types.SignedPartialSignatureMessage { return contributionProofMsg(msgSK, beaconSK, msgID, beaconID, slot, TestingDutySlot, false, false) }
var PreConsensusCustomSlotSelectionProofMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID, slot phase0.Slot) *types.SignedPartialSignatureMessage { return selectionProofMsg(msgSK, beaconSK, msgID, beaconID, slot, TestingDutySlot, 1, false) }
var PreConsensusFailedMsg = func(msgSigner *bls.SecretKey, msgSignerID types.OperatorID) *types.SignedPartialSignatureMessage { signer := NewTestingKeyManager() beacon := NewTestingBeaconNode() d, _ := beacon.DomainData(TestingDutyEpoch, types.DomainRandao) signed, root, _ := signer.SignBeaconObject(types.SSZUint64(TestingDutyEpoch), d, msgSigner.GetPublicKey().Serialize(), types.DomainRandao) msg := types.PartialSignatureMessages{ Type: types.RandaoPartialSig, Slot: TestingDutySlot, Messages: []*types.PartialSignatureMessage{ { PartialSignature: signed[:], SigningRoot: root, Signer: msgSignerID, }, }, } sig, _ := signer.SignRoot(msg, types.PartialSignatureType, msgSigner.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: msg, Signature: sig, Signer: msgSignerID, } }
var PreConsensusRandaoDifferentEpochMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { return randaoMsgV(sk, id, false, TestingDutyEpochV(version)+1, 1, false, version) }
var PreConsensusRandaoDifferentSignerMsgV = func( msgSigner, randaoSigner *bls.SecretKey, msgSignerID, randaoSignerID types.OperatorID, version spec.DataVersion, ) *types.SignedPartialSignatureMessage { signer := NewTestingKeyManager() beacon := NewTestingBeaconNode() epoch := TestingDutyEpochV(version) d, _ := beacon.DomainData(epoch, types.DomainRandao) signed, root, _ := signer.SignBeaconObject(types.SSZUint64(epoch), d, randaoSigner.GetPublicKey().Serialize(), types.DomainRandao) msg := types.PartialSignatureMessages{ Type: types.RandaoPartialSig, Slot: TestingProposerDutyV(version).Slot, Messages: []*types.PartialSignatureMessage{ { PartialSignature: signed[:], SigningRoot: root, Signer: randaoSignerID, }, }, } sig, _ := signer.SignRoot(msg, types.PartialSignatureType, msgSigner.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: msg, Signature: sig, Signer: msgSignerID, } }
var PreConsensusRandaoMsg = func(sk *bls.SecretKey, id types.OperatorID) *types.SignedPartialSignatureMessage { return randaoMsg(sk, id, false, TestingDutyEpoch, 1, false) }
var PreConsensusRandaoMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { return randaoMsgV(sk, id, false, TestingDutyEpochV(version), 1, false, version) }
var PreConsensusRandaoNextEpochMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { return randaoMsgV(sk, id, false, TestingDutyEpochV(version)+1, 1, false, version) }
PreConsensusRandaoNextEpochMsgV testing for a second duty start
var PreConsensusRandaoNoMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { return randaoMsgV(sk, id, false, TestingDutyEpochV(version), 0, false, version) }
var PreConsensusRandaoTooFewRootsMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { return randaoMsgV(sk, id, false, TestingDutyEpochV(version), 0, false, version) }
var PreConsensusRandaoTooManyRootsMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { return randaoMsgV(sk, id, false, TestingDutyEpochV(version), 2, false, version) }
var PreConsensusRandaoWrongBeaconSigMsgV = func(sk *bls.SecretKey, id types.OperatorID, version spec.DataVersion) *types.SignedPartialSignatureMessage { return randaoMsgV(sk, id, false, TestingDutyEpochV(version), 1, true, version) }
var PreConsensusSelectionProofMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { return PreConsensusCustomSlotSelectionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot) }
var PreConsensusSelectionProofNextEpochMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { return selectionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot2, TestingDutySlot2, 1, false) }
var PreConsensusSelectionProofTooFewRootsMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { return selectionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot, TestingDutySlot, 0, false) }
var PreConsensusSelectionProofTooManyRootsMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { return selectionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot, TestingDutySlot, 3, false) }
var PreConsensusSelectionProofWrongBeaconSigMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { return selectionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot, TestingDutySlot, 1, true) }
var PreConsensusValidatorRegistrationMsg = func(msgSK *bls.SecretKey, msgID types.OperatorID) *types.SignedPartialSignatureMessage { return validatorRegistrationMsg(msgSK, msgSK, msgID, msgID, 1, false, TestingDutyEpoch, false) }
var PreConsensusValidatorRegistrationTooFewRootsMsg = func(msgSK *bls.SecretKey, msgID types.OperatorID) *types.SignedPartialSignatureMessage { return validatorRegistrationMsg(msgSK, msgSK, msgID, msgID, 0, false, TestingDutyEpoch, false) }
var PreConsensusValidatorRegistrationTooManyRootsMsg = func(msgSK *bls.SecretKey, msgID types.OperatorID) *types.SignedPartialSignatureMessage { return validatorRegistrationMsg(msgSK, msgSK, msgID, msgID, 2, false, TestingDutyEpoch, false) }
var PreConsensusValidatorRegistrationWrongRootMsg = func(msgSK *bls.SecretKey, msgID types.OperatorID) *types.SignedPartialSignatureMessage { return validatorRegistrationMsg(msgSK, msgSK, msgID, msgID, 1, true, TestingDutyEpoch, false) }
var PreConsensusVoluntaryExitMsg = func(msgSK *bls.SecretKey, msgID types.OperatorID) *types.SignedPartialSignatureMessage { return VoluntaryExitMsg(msgSK, msgSK, msgID, msgID, 1, false, TestingDutyEpoch, false) }
var PreConsensusVoluntaryExitTooFewRootsMsg = func(msgSK *bls.SecretKey, msgID types.OperatorID) *types.SignedPartialSignatureMessage { return VoluntaryExitMsg(msgSK, msgSK, msgID, msgID, 0, false, TestingDutyEpoch, false) }
var PreConsensusVoluntaryExitTooManyRootsMsg = func(msgSK *bls.SecretKey, msgID types.OperatorID) *types.SignedPartialSignatureMessage { return VoluntaryExitMsg(msgSK, msgSK, msgID, msgID, 2, false, TestingDutyEpoch, false) }
var PreConsensusVoluntaryExitWrongRootMsg = func(msgSK *bls.SecretKey, msgID types.OperatorID) *types.SignedPartialSignatureMessage { return VoluntaryExitMsg(msgSK, msgSK, msgID, msgID, 1, true, TestingDutyEpoch, false) }
var PreConsensusWrongMsgSlotContributionProofMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { return contributionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot, TestingDutySlot+1, false, false) }
var PreConsensusWrongMsgSlotSelectionProofMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { return selectionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot, TestingDutySlot+1, 1, false) }
var PreConsensusWrongOrderContributionProofMsg = func(msgSK, beaconSK *bls.SecretKey, msgID, beaconID types.OperatorID) *types.SignedPartialSignatureMessage { return contributionProofMsg(msgSK, beaconSK, msgID, beaconID, TestingDutySlot, TestingDutySlot, true, false) }
var ProposerBlindedBlockRunner = func(keySet *TestKeySet) ssv.Runner { ret := baseRunner( types.BNRoleProposer, ssv.ProposerValueCheckF(NewTestingKeyManager(), types.BeaconTestNetwork, TestingValidatorPubKey[:], TestingValidatorIndex, nil), keySet, ) ret.(*ssv.ProposerRunner).ProducesBlindedBlocks = true return ret }
var ProposerMsgID = func() []byte { ret := types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleProposer) return ret[:] }()
var ProposerRunner = func(keySet *TestKeySet) ssv.Runner { return baseRunner(types.BNRoleProposer, ssv.ProposerValueCheckF(NewTestingKeyManager(), types.BeaconTestNetwork, TestingValidatorPubKey[:], TestingValidatorIndex, nil), keySet) }
var SSVDecidingMsgsForHeight = func(consensusData *types.ConsensusData, msgIdentifier []byte, height qbft.Height, keySet *TestKeySet) []*qbft.SignedMessage { byts, _ := consensusData.Encode() r, _ := qbft.HashDataRoot(byts) fullData, _ := consensusData.MarshalSSZ() return SSVDecidingMsgsForHeightWithRoot(r, fullData, msgIdentifier, height, keySet) }
//////////////////////////////// For SSV Tests ////////////////////////////////////////////////////////////////
var SSVDecidingMsgsForHeightWithRoot = func(root [32]byte, fullData, msgIdentifier []byte, height qbft.Height, keySet *TestKeySet) []*qbft.SignedMessage { msgs := make([]*qbft.SignedMessage, 0) s := SignQBFTMsg(keySet.Shares[1], 1, &qbft.Message{ MsgType: qbft.ProposalMsgType, Height: height, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, }) s.FullData = fullData msgs = append(msgs, s) for i := uint64(1); i <= keySet.Threshold; i++ { msgs = append(msgs, SignQBFTMsg(keySet.Shares[types.OperatorID(i)], types.OperatorID(i), &qbft.Message{ MsgType: qbft.PrepareMsgType, Height: height, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, })) } for i := uint64(1); i <= keySet.Threshold; i++ { msgs = append(msgs, SignQBFTMsg(keySet.Shares[types.OperatorID(i)], types.OperatorID(i), &qbft.Message{ MsgType: qbft.CommitMsgType, Height: height, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, })) } return msgs }
var SSVDecidingMsgsV = func(consensusData *types.ConsensusData, ks *TestKeySet, role types.BeaconRole) []*types.SSVMessage { id := types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], role) ssvMsgF := func(qbftMsg *qbft.SignedMessage, partialSigMsg *types.SignedPartialSignatureMessage) *types.SSVMessage { var byts []byte var msgType types.MsgType if partialSigMsg != nil { msgType = types.SSVPartialSignatureMsgType byts, _ = partialSigMsg.Encode() } else { msgType = types.SSVConsensusMsgType byts, _ = qbftMsg.Encode() } return &types.SSVMessage{ MsgType: msgType, MsgID: id, Data: byts, } } base := make([]*types.SSVMessage, 0) if role == types.BNRoleProposer { for i := uint64(1); i <= ks.Threshold; i++ { base = append(base, ssvMsgF(nil, PreConsensusRandaoMsgV(ks.Shares[types.OperatorID(i)], types.OperatorID(i), consensusData.Version))) } } if role == types.BNRoleAggregator { for i := uint64(1); i <= ks.Threshold; i++ { base = append(base, ssvMsgF(nil, PreConsensusSelectionProofMsg(ks.Shares[types.OperatorID(i)], ks.Shares[types.OperatorID(i)], types.OperatorID(i), types.OperatorID(i)))) } } if role == types.BNRoleSyncCommitteeContribution { for i := uint64(1); i <= ks.Threshold; i++ { base = append(base, ssvMsgF(nil, PreConsensusContributionProofMsg(ks.Shares[types.OperatorID(i)], ks.Shares[types.OperatorID(i)], types.OperatorID(i), types.OperatorID(i)))) } } qbftMsgs := SSVDecidingMsgsForHeight(consensusData, id[:], qbft.Height(consensusData.Duty.Slot), ks) for _, msg := range qbftMsgs { base = append(base, ssvMsgF(msg, nil)) } return base }
var SSVExpectedDecidingMsgsForHeight = func(consensusData *types.ConsensusData, msgIdentifier []byte, height qbft.Height, keySet *TestKeySet) []*qbft.SignedMessage { byts, _ := consensusData.Encode() r, _ := qbft.HashDataRoot(byts) fullData, _ := consensusData.MarshalSSZ() return SSVExpectedDecidingMsgsForHeightWithRoot(r, fullData, msgIdentifier, height, keySet) }
var SSVExpectedDecidingMsgsForHeightWithRoot = func(root [32]byte, fullData, msgIdentifier []byte, height qbft.Height, keySet *TestKeySet) []*qbft.SignedMessage { msgs := make([]*qbft.SignedMessage, 0) s := SignQBFTMsg(keySet.Shares[1], 1, &qbft.Message{ MsgType: qbft.ProposalMsgType, Height: height, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, }) s.FullData = fullData msgs = append(msgs, s) for i := uint64(1); i <= keySet.Threshold; i++ { msgs = append(msgs, SignQBFTMsg(keySet.Shares[types.OperatorID(i)], types.OperatorID(i), &qbft.Message{ MsgType: qbft.PrepareMsgType, Height: height, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, })) } for i := uint64(1); i <= keySet.Threshold; i++ { msgs = append(msgs, SignQBFTMsg(keySet.Shares[types.OperatorID(i)], types.OperatorID(i), &qbft.Message{ MsgType: qbft.CommitMsgType, Height: height, Round: qbft.FirstRound, Identifier: msgIdentifier, Root: root, })) } return msgs }
var SSVMsgAggregator = func(qbftMsg *qbft.SignedMessage, partialSigMsg *types.SignedPartialSignatureMessage) *types.SSVMessage { return ssvMsg(qbftMsg, partialSigMsg, types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleAggregator)) }
var SSVMsgAttester = func(qbftMsg *qbft.SignedMessage, partialSigMsg *types.SignedPartialSignatureMessage) *types.SSVMessage { return ssvMsg(qbftMsg, partialSigMsg, types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleAttester)) }
var SSVMsgProposer = func(qbftMsg *qbft.SignedMessage, partialSigMsg *types.SignedPartialSignatureMessage) *types.SSVMessage { return ssvMsg(qbftMsg, partialSigMsg, types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleProposer)) }
var SSVMsgSyncCommittee = func(qbftMsg *qbft.SignedMessage, partialSigMsg *types.SignedPartialSignatureMessage) *types.SSVMessage { return ssvMsg(qbftMsg, partialSigMsg, types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleSyncCommittee)) }
var SSVMsgSyncCommitteeContribution = func(qbftMsg *qbft.SignedMessage, partialSigMsg *types.SignedPartialSignatureMessage) *types.SSVMessage { return ssvMsg(qbftMsg, partialSigMsg, types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleSyncCommitteeContribution)) }
var SSVMsgValidatorRegistration = func(qbftMsg *qbft.SignedMessage, partialSigMsg *types.SignedPartialSignatureMessage) *types.SSVMessage { return ssvMsg(qbftMsg, partialSigMsg, types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleValidatorRegistration)) }
var SSVMsgVoluntaryExit = func(qbftMsg *qbft.SignedMessage, partialSigMsg *types.SignedPartialSignatureMessage) *types.SSVMessage { return ssvMsg(qbftMsg, partialSigMsg, types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleVoluntaryExit)) }
var SSVMsgWrongID = func(qbftMsg *qbft.SignedMessage, partialSigMsg *types.SignedPartialSignatureMessage) *types.SSVMessage { return ssvMsg(qbftMsg, partialSigMsg, types.NewMsgID(TestingSSVDomainType, TestingWrongValidatorPubKey[:], types.BNRoleAttester)) }
var SevenOperatorsInstance = func() *qbft.Instance { return baseInstance(TestingShare(Testing7SharesSet()), Testing7SharesSet(), []byte{1, 2, 3, 4}) }
var SignQBFTMsg = func(sk *bls.SecretKey, id types.OperatorID, msg *qbft.Message) *qbft.SignedMessage { domain := TestingSSVDomainType sigType := types.QBFTSignatureType r, _ := types.ComputeSigningRoot(msg, types.ComputeSignatureDomain(domain, sigType)) sig := sk.SignByte(r[:]) return &qbft.SignedMessage{ Message: *msg, Signers: []types.OperatorID{id}, Signature: sig.Serialize(), } }
var SupportedBlockVersions = []spec.DataVersion{spec.DataVersionBellatrix, spec.DataVersionCapella}
SupportedBlockVersions is a list of supported regular/blinded beacon block versions by spec.
var SyncCommitteeContributionMsgID = func() []byte { ret := types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleSyncCommitteeContribution) return ret[:] }()
var SyncCommitteeContributionRunner = func(keySet *TestKeySet) ssv.Runner { return baseRunner(types.BNRoleSyncCommitteeContribution, ssv.SyncCommitteeContributionValueCheckF(NewTestingKeyManager(), types.BeaconTestNetwork, TestingValidatorPubKey[:], TestingValidatorIndex), keySet) }
var SyncCommitteeMsgID = func() []byte { ret := types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleSyncCommittee) return ret[:] }()
var SyncCommitteeRunner = func(keySet *TestKeySet) ssv.Runner { return baseRunner(types.BNRoleSyncCommittee, ssv.SyncCommitteeValueCheckF(NewTestingKeyManager(), types.BeaconTestNetwork, TestingValidatorPubKey[:], TestingValidatorIndex), keySet) }
var TenOperatorsInstance = func() *qbft.Instance { return baseInstance(TestingShare(Testing10SharesSet()), Testing10SharesSet(), []byte{1, 2, 3, 4}) }
var TestAggregatorConsensusData = &types.ConsensusData{ Duty: TestingAggregatorDuty, DataSSZ: TestingAggregateAndProofBytes, }
var TestAggregatorConsensusDataByts, _ = TestAggregatorConsensusData.Encode()
var TestAttesterConsensusData = &types.ConsensusData{ Duty: TestingAttesterDuty, DataSSZ: TestingAttestationDataBytes, }
var TestAttesterConsensusDataByts, _ = TestAttesterConsensusData.Encode()
var TestAttesterNextEpochConsensusData = &types.ConsensusData{ Duty: TestingAttesterDutyNextEpoch, DataSSZ: TestingAttestationNextEpochDataBytes, }
var TestAttesterWithJustificationsConsensusData = func(ks *TestKeySet) *types.ConsensusData { justif := make([]*types.SignedPartialSignatureMessage, 0) for i := uint64(1); i <= ks.Threshold; i++ { justif = append(justif, PreConsensusRandaoMsg(ks.Shares[i], i)) } return &types.ConsensusData{ Duty: TestingAttesterDuty, Version: spec.DataVersionBellatrix, PreConsensusJustifications: justif, DataSSZ: TestingAttestationDataBytes, } }
var TestConsensusUnkownDutyTypeData = &types.ConsensusData{ Duty: TestingUnknownDutyType, DataSSZ: TestingAttestationDataBytes, }
var TestConsensusUnkownDutyTypeDataByts, _ = TestConsensusUnkownDutyTypeData.Encode()
var TestConsensusWrongDutyPKData = &types.ConsensusData{ Duty: TestingWrongDutyPK, DataSSZ: TestingAttestationDataBytes, }
var TestConsensusWrongDutyPKDataByts, _ = TestConsensusWrongDutyPKData.Encode()
var TestContributionProofWithJustificationsConsensusData = func(ks *TestKeySet) *types.ConsensusData { justif := make([]*types.SignedPartialSignatureMessage, 0) for i := uint64(0); i <= ks.Threshold; i++ { justif = append(justif, PreConsensusContributionProofMsg(ks.Shares[i+1], ks.Shares[i+1], i+1, i+1)) } return &types.ConsensusData{ Duty: TestingSyncCommitteeContributionDuty, Version: spec.DataVersionBellatrix, PreConsensusJustifications: justif, DataSSZ: TestingContributionsDataBytes, } }
var TestProposerBlindedBlockConsensusDataBytsV = func(version spec.DataVersion) []byte { cd := TestProposerBlindedBlockConsensusDataV(version) byts, _ := cd.Encode() return byts }
var TestProposerBlindedBlockConsensusDataV = func(version spec.DataVersion) *types.ConsensusData { return &types.ConsensusData{ Duty: *TestingProposerDutyV(version), Version: version, DataSSZ: TestingBlindedBeaconBlockBytesV(version), } }
var TestProposerBlindedWithJustificationsConsensusDataV = func(ks *TestKeySet, version spec.DataVersion) *types.ConsensusData { justif := make([]*types.SignedPartialSignatureMessage, 0) for i := uint64(0); i <= ks.Threshold; i++ { justif = append(justif, PreConsensusRandaoMsgV(ks.Shares[i+1], i+1, version)) } cd := TestProposerBlindedBlockConsensusDataV(version) cd.PreConsensusJustifications = justif return cd }
var TestProposerConsensusDataBytsV = func(version spec.DataVersion) []byte { cd := TestProposerConsensusDataV(version) byts, _ := cd.Encode() return byts }
var TestProposerConsensusDataV = func(version spec.DataVersion) *types.ConsensusData { duty := TestingProposerDutyV(version) return &types.ConsensusData{ Duty: *duty, Version: version, DataSSZ: TestingBeaconBlockBytesV(version), } }
var TestProposerWithJustificationsConsensusDataV = func(ks *TestKeySet, version spec.DataVersion) *types.ConsensusData { justif := make([]*types.SignedPartialSignatureMessage, 0) for i := uint64(0); i <= ks.Threshold; i++ { justif = append(justif, PreConsensusRandaoMsgV(ks.Shares[i+1], i+1, version)) } cd := TestProposerConsensusDataV(version) cd.PreConsensusJustifications = justif return cd }
var TestSelectionProofWithJustificationsConsensusData = func(ks *TestKeySet) *types.ConsensusData { justif := make([]*types.SignedPartialSignatureMessage, 0) for i := uint64(0); i <= ks.Threshold; i++ { justif = append(justif, PreConsensusSelectionProofMsg(ks.Shares[i+1], ks.Shares[i+1], i+1, i+1)) } return &types.ConsensusData{ Duty: TestingAggregatorDuty, Version: spec.DataVersionBellatrix, PreConsensusJustifications: justif, DataSSZ: TestingAggregateAndProofBytes, } }
var TestSyncCommitteeConsensusData = &types.ConsensusData{ Duty: TestingSyncCommitteeDuty, DataSSZ: TestingSyncCommitteeBlockRoot[:], }
var TestSyncCommitteeConsensusDataByts, _ = TestSyncCommitteeConsensusData.Encode()
var TestSyncCommitteeContributionConsensusData = &types.ConsensusData{ Duty: TestingSyncCommitteeContributionDuty, DataSSZ: TestingContributionsDataBytes, }
var TestSyncCommitteeContributionConsensusDataByts, _ = TestSyncCommitteeContributionConsensusData.Encode()
var TestSyncCommitteeContributionConsensusDataRoot = func() [32]byte { return sha256.Sum256(TestSyncCommitteeContributionConsensusDataByts) }()
var TestSyncCommitteeNextEpochConsensusData = &types.ConsensusData{ Duty: TestingSyncCommitteeDutyNextEpoch, DataSSZ: TestingSyncCommitteeBlockRoot[:], }
var TestSyncCommitteeNextEpochConsensusDataByts, _ = TestSyncCommitteeNextEpochConsensusData.Encode()
var TestSyncCommitteeWithJustificationsConsensusData = func(ks *TestKeySet) *types.ConsensusData { justif := make([]*types.SignedPartialSignatureMessage, 0) for i := uint64(0); i <= ks.Threshold; i++ { justif = append(justif, PreConsensusRandaoMsg(ks.Shares[i+1], i+1)) } return &types.ConsensusData{ Duty: TestingSyncCommitteeDuty, Version: spec.DataVersionBellatrix, PreConsensusJustifications: justif, DataSSZ: TestingSyncCommitteeBlockRoot[:], } }
TestSyncCommitteeWithJustificationsConsensusData is an invalid sync committee msg (doesn't have pre-consensus)
var TestingAggregateAndProof = &phase0.AggregateAndProof{ AggregatorIndex: 1, SelectionProof: phase0.BLSSignature{}, Aggregate: &phase0.Attestation{ AggregationBits: bitfield.NewBitlist(128), Signature: phase0.BLSSignature{}, Data: TestingAttestationData, }, }
var TestingAggregateAndProofBytes = func() []byte { ret, _ := TestingAggregateAndProof.MarshalSSZ() return ret }()
var TestingAggregatorDuty = types.Duty{ Type: types.BNRoleAggregator, PubKey: TestingValidatorPubKey, Slot: TestingDutySlot, ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 22, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, }
var TestingAggregatorDutyNextEpoch = types.Duty{ Type: types.BNRoleAggregator, PubKey: TestingValidatorPubKey, Slot: TestingDutySlot2, ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 22, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, }
TestingAggregatorDutyNextEpoch testing for a second duty start
var TestingAttestationData = &phase0.AttestationData{ Slot: TestingDutySlot, Index: 3, BeaconBlockRoot: phase0.Root{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2}, Source: &phase0.Checkpoint{ Epoch: 0, Root: phase0.Root{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2}, }, Target: &phase0.Checkpoint{ Epoch: 1, Root: phase0.Root{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2}, }, }
var TestingAttestationDataBytes = func() []byte { ret, _ := TestingAttestationData.MarshalSSZ() return ret }()
var TestingAttestationNextEpochData = &phase0.AttestationData{ Slot: TestingDutySlot2, Index: 3, BeaconBlockRoot: phase0.Root{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2}, Source: &phase0.Checkpoint{ Epoch: 0, Root: phase0.Root{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2}, }, Target: &phase0.Checkpoint{ Epoch: 1, Root: phase0.Root{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2}, }, }
var TestingAttestationNextEpochDataBytes = func() []byte { ret, _ := TestingAttestationNextEpochData.MarshalSSZ() return ret }()
var TestingAttesterDuty = types.Duty{ Type: types.BNRoleAttester, PubKey: TestingValidatorPubKey, Slot: TestingDutySlot, ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 3, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, }
var TestingAttesterDutyNextEpoch = types.Duty{ Type: types.BNRoleAttester, PubKey: TestingValidatorPubKey, Slot: TestingDutySlot2, ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 3, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, }
var TestingAttesterNextEpochConsensusDataByts, _ = TestAttesterNextEpochConsensusData.Encode()
var TestingBeaconBlock = &bellatrix.BeaconBlock{ Slot: 12, ProposerIndex: 10, ParentRoot: phase0.Root{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2}, StateRoot: phase0.Root{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2}, Body: &bellatrix.BeaconBlockBody{ RANDAOReveal: phase0.BLSSignature{}, ETH1Data: &phase0.ETH1Data{ DepositRoot: phase0.Root{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2}, DepositCount: 100, BlockHash: []byte{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2}, }, Graffiti: [32]byte{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 1, 2}, ProposerSlashings: []*phase0.ProposerSlashing{}, AttesterSlashings: []*phase0.AttesterSlashing{}, Attestations: []*phase0.Attestation{ { AggregationBits: bitfield.NewBitlist(122), Data: TestingAttestationData, Signature: phase0.BLSSignature{}, }, }, Deposits: []*phase0.Deposit{}, VoluntaryExits: []*phase0.SignedVoluntaryExit{}, SyncAggregate: &altair.SyncAggregate{ SyncCommitteeBits: bitfield.NewBitvector512(), SyncCommitteeSignature: phase0.BLSSignature{}, }, ExecutionPayload: &bellatrix.ExecutionPayload{ ParentHash: phase0.Hash32{}, FeeRecipient: bellatrix.ExecutionAddress{}, StateRoot: phase0.Hash32{}, ReceiptsRoot: phase0.Hash32{}, LogsBloom: [256]byte{}, PrevRandao: [32]byte{}, BlockNumber: 100, GasLimit: 1000000, GasUsed: 800000, Timestamp: 123456789, BaseFeePerGas: [32]byte{}, BlockHash: phase0.Hash32{}, Transactions: Transactions, }, }, }
var TestingBeaconBlockBytesV = func(version spec.DataVersion) []byte { var ret []byte vBlk := TestingBeaconBlockV(version) switch version { case spec.DataVersionBellatrix: if vBlk.Bellatrix == nil { panic("empty block") } ret, _ = vBlk.Bellatrix.MarshalSSZ() case spec.DataVersionCapella: if vBlk.Capella == nil { panic("empty block") } ret, _ = vBlk.Capella.MarshalSSZ() default: panic("unsupported version") } return ret }
var TestingBeaconBlockCapella = func() *capella.BeaconBlock { var res capella.BeaconBlock err := json.Unmarshal(capellaBlock, &res) if err != nil { panic(err) } res.Slot = TestingDutySlotCapella return &res }()
var TestingBeaconBlockV = func(version spec.DataVersion) *spec.VersionedBeaconBlock { switch version { case spec.DataVersionBellatrix: return &spec.VersionedBeaconBlock{ Version: version, Bellatrix: TestingBeaconBlock, } case spec.DataVersionCapella: return &spec.VersionedBeaconBlock{ Version: version, Capella: TestingBeaconBlockCapella, } default: panic("unsupported version") } }
var TestingBlindedBeaconBlock = func() *apiv1bellatrix.BlindedBeaconBlock { fullBlk := TestingBeaconBlock txRoot, _ := types.SSZTransactions(fullBlk.Body.ExecutionPayload.Transactions).HashTreeRoot() ret := &apiv1bellatrix.BlindedBeaconBlock{ Slot: fullBlk.Slot, ProposerIndex: fullBlk.ProposerIndex, ParentRoot: fullBlk.ParentRoot, StateRoot: fullBlk.StateRoot, Body: &apiv1bellatrix.BlindedBeaconBlockBody{ RANDAOReveal: fullBlk.Body.RANDAOReveal, ETH1Data: fullBlk.Body.ETH1Data, Graffiti: fullBlk.Body.Graffiti, ProposerSlashings: fullBlk.Body.ProposerSlashings, AttesterSlashings: fullBlk.Body.AttesterSlashings, Attestations: fullBlk.Body.Attestations, Deposits: fullBlk.Body.Deposits, VoluntaryExits: fullBlk.Body.VoluntaryExits, SyncAggregate: fullBlk.Body.SyncAggregate, ExecutionPayloadHeader: &bellatrix.ExecutionPayloadHeader{ ParentHash: fullBlk.Body.ExecutionPayload.ParentHash, FeeRecipient: fullBlk.Body.ExecutionPayload.FeeRecipient, StateRoot: fullBlk.Body.ExecutionPayload.StateRoot, ReceiptsRoot: fullBlk.Body.ExecutionPayload.ReceiptsRoot, LogsBloom: fullBlk.Body.ExecutionPayload.LogsBloom, PrevRandao: fullBlk.Body.ExecutionPayload.PrevRandao, BlockNumber: fullBlk.Body.ExecutionPayload.BlockNumber, GasLimit: fullBlk.Body.ExecutionPayload.GasLimit, GasUsed: fullBlk.Body.ExecutionPayload.GasUsed, Timestamp: fullBlk.Body.ExecutionPayload.Timestamp, ExtraData: fullBlk.Body.ExecutionPayload.ExtraData, BaseFeePerGas: fullBlk.Body.ExecutionPayload.BaseFeePerGas, BlockHash: fullBlk.Body.ExecutionPayload.BlockHash, TransactionsRoot: txRoot, }, }, } return ret }()
var TestingBlindedBeaconBlockBytesV = func(version spec.DataVersion) []byte { var ret []byte vBlk := TestingBlindedBeaconBlockV(version) switch version { case spec.DataVersionBellatrix: if vBlk.Bellatrix == nil { panic("empty block") } ret, _ = vBlk.Bellatrix.MarshalSSZ() case spec.DataVersionCapella: if vBlk.Capella == nil { panic("empty block") } ret, _ = vBlk.Capella.MarshalSSZ() default: panic("unsupported version") } return ret }
var TestingBlindedBeaconBlockCapella = func() *apiv1capella.BlindedBeaconBlock { fullBlk := TestingBeaconBlockCapella txRoot, _ := types.SSZTransactions(fullBlk.Body.ExecutionPayload.Transactions).HashTreeRoot() withdrawalsRoot, _ := types.SSZWithdrawals(fullBlk.Body.ExecutionPayload.Withdrawals).HashTreeRoot() ret := &apiv1capella.BlindedBeaconBlock{ Slot: fullBlk.Slot, ProposerIndex: fullBlk.ProposerIndex, ParentRoot: fullBlk.ParentRoot, StateRoot: fullBlk.StateRoot, Body: &apiv1capella.BlindedBeaconBlockBody{ RANDAOReveal: fullBlk.Body.RANDAOReveal, ETH1Data: fullBlk.Body.ETH1Data, Graffiti: fullBlk.Body.Graffiti, ProposerSlashings: fullBlk.Body.ProposerSlashings, AttesterSlashings: fullBlk.Body.AttesterSlashings, Attestations: fullBlk.Body.Attestations, Deposits: fullBlk.Body.Deposits, VoluntaryExits: fullBlk.Body.VoluntaryExits, SyncAggregate: fullBlk.Body.SyncAggregate, ExecutionPayloadHeader: &capella.ExecutionPayloadHeader{ ParentHash: fullBlk.Body.ExecutionPayload.ParentHash, FeeRecipient: fullBlk.Body.ExecutionPayload.FeeRecipient, StateRoot: fullBlk.Body.ExecutionPayload.StateRoot, ReceiptsRoot: fullBlk.Body.ExecutionPayload.ReceiptsRoot, LogsBloom: fullBlk.Body.ExecutionPayload.LogsBloom, PrevRandao: fullBlk.Body.ExecutionPayload.PrevRandao, BlockNumber: fullBlk.Body.ExecutionPayload.BlockNumber, GasLimit: fullBlk.Body.ExecutionPayload.GasLimit, GasUsed: fullBlk.Body.ExecutionPayload.GasUsed, Timestamp: fullBlk.Body.ExecutionPayload.Timestamp, ExtraData: fullBlk.Body.ExecutionPayload.ExtraData, BaseFeePerGas: fullBlk.Body.ExecutionPayload.BaseFeePerGas, BlockHash: fullBlk.Body.ExecutionPayload.BlockHash, TransactionsRoot: txRoot, WithdrawalsRoot: withdrawalsRoot, }, BLSToExecutionChanges: fullBlk.Body.BLSToExecutionChanges, }, } return ret }()
var TestingBlindedBeaconBlockV = func(version spec.DataVersion) *api.VersionedBlindedBeaconBlock { switch version { case spec.DataVersionBellatrix: return &api.VersionedBlindedBeaconBlock{ Version: version, Bellatrix: TestingBlindedBeaconBlock, } case spec.DataVersionCapella: return &api.VersionedBlindedBeaconBlock{ Version: version, Capella: TestingBlindedBeaconBlockCapella, } default: panic("unsupported version") } }
var TestingCommitMessage = func(sk *bls.SecretKey, id types.OperatorID) *qbft.SignedMessage { return TestingCommitMessageWithRound(sk, id, qbft.FirstRound) }
* Commit messages
var TestingCommitMessageWithHeight = func(sk *bls.SecretKey, id types.OperatorID, height qbft.Height) *qbft.SignedMessage { return TestingCommitMessageWithParams(sk, id, qbft.FirstRound, height, TestingIdentifier, TestingQBFTRootData) }
var TestingCommitMessageWithIdentifierAndRoot = func(sk *bls.SecretKey, id types.OperatorID, identifier []byte, root [32]byte) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.CommitMsgType, Height: qbft.FirstHeight, Round: qbft.FirstRound, Identifier: identifier, Root: root, } ret := SignQBFTMsg(sk, id, msg) ret.FullData = []byte{} return ret }
var TestingCommitMessageWithParams = func( sk *bls.SecretKey, id types.OperatorID, round qbft.Round, height qbft.Height, identifier []byte, root [32]byte, ) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.CommitMsgType, Height: height, Round: round, Identifier: identifier, Root: root, } ret := SignQBFTMsg(sk, id, msg) return ret }
var TestingCommitMessageWithRound = func(sk *bls.SecretKey, id types.OperatorID, round qbft.Round) *qbft.SignedMessage { return TestingCommitMessageWithParams(sk, id, round, qbft.FirstHeight, TestingIdentifier, TestingQBFTRootData) }
var TestingCommitMessageWrongHeight = func(sk *bls.SecretKey, id types.OperatorID) *qbft.SignedMessage { return TestingCommitMessageWithParams(sk, id, qbft.FirstRound, 10, TestingIdentifier, DifferentRoot) }
var TestingCommitMessageWrongRoot = func(sk *bls.SecretKey, id types.OperatorID) *qbft.SignedMessage { return TestingCommitMessageWithParams(sk, id, qbft.FirstRound, qbft.FirstHeight, TestingIdentifier, DifferentRoot) }
var TestingCommitMultiSignerMessage = func(sks []*bls.SecretKey, ids []types.OperatorID) *qbft.SignedMessage { return TestingCommitMultiSignerMessageWithRound(sks, ids, qbft.FirstRound) }
var TestingCommitMultiSignerMessageWithHeight = func(sks []*bls.SecretKey, ids []types.OperatorID, height qbft.Height) *qbft.SignedMessage { return TestingCommitMultiSignerMessageWithParams(sks, ids, qbft.FirstRound, height, TestingIdentifier, TestingQBFTRootData, TestingQBFTFullData) }
var TestingCommitMultiSignerMessageWithHeightAndIdentifier = func(sks []*bls.SecretKey, ids []types.OperatorID, height qbft.Height, identifier []byte) *qbft.SignedMessage { return TestingCommitMultiSignerMessageWithParams(sks, ids, qbft.FirstRound, height, identifier, TestingQBFTRootData, TestingQBFTFullData) }
var TestingCommitMultiSignerMessageWithParams = func( sks []*bls.SecretKey, ids []types.OperatorID, round qbft.Round, height qbft.Height, identifier []byte, root [32]byte, fullData []byte, ) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.CommitMsgType, Height: height, Round: round, Identifier: identifier, Root: root, } ret := MultiSignQBFTMsg(sks, ids, msg) ret.FullData = fullData return ret }
var TestingCommitMultiSignerMessageWithRound = func(sks []*bls.SecretKey, ids []types.OperatorID, round qbft.Round) *qbft.SignedMessage { return TestingCommitMultiSignerMessageWithParams(sks, ids, round, qbft.FirstHeight, TestingIdentifier, TestingQBFTRootData, TestingQBFTFullData) }
var TestingConfig = func(keySet *TestKeySet) *qbft.Config { return &qbft.Config{ Signer: NewTestingKeyManager(), SigningPK: keySet.Shares[1].GetPublicKey().Serialize(), Domain: TestingSSVDomainType, ValueCheckF: func(data []byte) error { if bytes.Equal(data, TestingInvalidValueCheck) { return errors.New("invalid value") } if len(data) == 0 { return errors.New("invalid value") } return nil }, ProposerF: func(state *qbft.State, round qbft.Round) types.OperatorID { return 1 }, Network: NewTestingNetwork(), Timer: NewTestingTimer(), } }
var TestingContributionProofIndexes = []uint64{0, 1, 2}
var TestingContributionProofsSigned = func() []phase0.BLSSignature { byts1, _ := hex.DecodeString("b18833bb7549ec33e8ac414ba002fd45bb094ca300bd24596f04a434a89beea462401da7c6b92fb3991bd17163eb603604a40e8dd6781266c990023446776ff42a9313df26a0a34184a590e57fa4003d610c2fa214db4e7dec468592010298bc") byts2, _ := hex.DecodeString("9094342c95146554df849dc20f7425fca692dacee7cb45258ddd264a8e5929861469fda3d1567b9521cba83188ffd61a0dbe6d7180c7a96f5810d18db305e9143772b766d368aa96d3751f98d0ce2db9f9e6f26325702088d87f0de500c67c68") byts3, _ := hex.DecodeString("a7f88ce43eff3aa8cdd2e3957c5bead4e21353fbecac6079a5398d03019bc45ff7c951785172deee70e9bc5abbc8ca6a0f0441e9d4cc9da74c31121357f7d7c7de9533f6f457da493e3314e22d554ab76613e469b050e246aff539a33807197c") ret := make([]phase0.BLSSignature, 0) for _, byts := range [][]byte{byts1, byts2, byts3} { b := phase0.BLSSignature{} copy(b[:], byts) ret = append(ret, b) } return ret }()
var TestingContributionsData = func() types.Contributions { d := types.Contributions{} d = append(d, &types.Contribution{ SelectionProofSig: TestingContributionProofsSigned[0], Contribution: *TestingSyncCommitteeContributions[0], }) d = append(d, &types.Contribution{ SelectionProofSig: TestingContributionProofsSigned[1], Contribution: *TestingSyncCommitteeContributions[1], }) d = append(d, &types.Contribution{ SelectionProofSig: TestingContributionProofsSigned[2], Contribution: *TestingSyncCommitteeContributions[2], }) return d }()
var TestingContributionsDataBytes = func() []byte { ret, _ := TestingContributionsData.MarshalSSZ() return ret }()
var TestingDutyEpochV = func(version spec.DataVersion) phase0.Epoch { switch version { case spec.DataVersionBellatrix: return TestingDutyEpochBellatrix case spec.DataVersionCapella: return TestingDutyEpochCapella default: panic("unsupported version") } }
var TestingDutySlotV = func(version spec.DataVersion) phase0.Slot { switch version { case spec.DataVersionBellatrix: return TestingDutySlotBellatrix case spec.DataVersionCapella: return TestingDutySlotCapella default: panic("unsupported version") } }
var TestingFeeRecipient = bellatrix.ExecutionAddress(ethAddressFromHex("535953b5a6040074948cf185eaa7d2abbd66808f"))
var TestingHighestDecidedSlot = phase0.Slot(0)
var TestingIdentifier = []byte{1, 2, 3, 4}
var TestingInvalidDutySlotV = func(version spec.DataVersion) phase0.Slot { switch version { case spec.DataVersionBellatrix: return TestingDutySlotBellatrixInvalid case spec.DataVersionCapella: return TestingDutySlotCapellaInvalid default: panic("unsupported version") } }
var TestingInvalidMessage = func(sk *bls.SecretKey, id types.OperatorID, msgType qbft.MessageType) *qbft.SignedMessage { return TestingMultiSignerInvalidMessage([]*bls.SecretKey{sk}, []types.OperatorID{id}, msgType) }
var TestingInvalidValueCheck = []byte{1, 1, 1, 1}
var TestingMultiSignerInvalidMessage = func(sks []*bls.SecretKey, ids []types.OperatorID, msgType qbft.MessageType) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: msgType, Height: qbft.FirstHeight, Round: qbft.FirstRound, Identifier: []byte{}, Root: TestingQBFTRootData, } ret := MultiSignQBFTMsg(sks, ids, msg) ret.FullData = TestingQBFTFullData return ret }
var TestingMultiSignerProposalMessage = func(sks []*bls.SecretKey, ids []types.OperatorID) *qbft.SignedMessage { return TestingMultiSignerProposalMessageWithParams(sks, ids, qbft.FirstRound, qbft.FirstHeight, TestingIdentifier, TestingQBFTFullData, TestingQBFTRootData) }
var TestingMultiSignerProposalMessageWithHeight = func(sks []*bls.SecretKey, ids []types.OperatorID, height qbft.Height) *qbft.SignedMessage { return TestingMultiSignerProposalMessageWithParams(sks, ids, qbft.FirstRound, height, TestingIdentifier, TestingQBFTFullData, TestingQBFTRootData) }
var TestingMultiSignerProposalMessageWithParams = func( sk []*bls.SecretKey, id []types.OperatorID, round qbft.Round, height qbft.Height, identifier, fullData []byte, root [32]byte, ) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.ProposalMsgType, Height: height, Round: round, Identifier: identifier, Root: root, } ret := MultiSignQBFTMsg(sk, id, msg) ret.FullData = fullData return ret }
var TestingMultiSignerRoundChangeMessage = func(sks []*bls.SecretKey, ids []types.OperatorID) *qbft.SignedMessage { return TestingMultiSignerRoundChangeMessageWithParams(sks, ids, qbft.FirstRound, qbft.FirstHeight, TestingQBFTRootData) }
var TestingMultiSignerRoundChangeMessageWithHeight = func(sks []*bls.SecretKey, ids []types.OperatorID, height qbft.Height) *qbft.SignedMessage { return TestingMultiSignerRoundChangeMessageWithParams(sks, ids, qbft.FirstRound, height, TestingQBFTRootData) }
var TestingMultiSignerRoundChangeMessageWithParams = func(sk []*bls.SecretKey, id []types.OperatorID, round qbft.Round, height qbft.Height, root [32]byte) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.RoundChangeMsgType, Height: height, Round: round, Identifier: TestingIdentifier, Root: root, } ret := MultiSignQBFTMsg(sk, id, msg) ret.FullData = TestingQBFTFullData return ret }
var TestingMultiSignerRoundChangeMessageWithRound = func(sks []*bls.SecretKey, ids []types.OperatorID, round qbft.Round) *qbft.SignedMessage { return TestingMultiSignerRoundChangeMessageWithParams(sks, ids, round, qbft.FirstHeight, TestingQBFTRootData) }
var TestingPrepareMessage = func(sk *bls.SecretKey, id types.OperatorID) *qbft.SignedMessage { return TestingPrepareMessageWithRound(sk, id, qbft.FirstRound) }
* Prepare messages
var TestingPrepareMessageWithFullData = func(sk *bls.SecretKey, id types.OperatorID, fullData []byte) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.PrepareMsgType, Height: qbft.FirstHeight, Round: qbft.FirstRound, Identifier: TestingIdentifier, Root: sha256.Sum256(fullData), } ret := SignQBFTMsg(sk, id, msg) ret.FullData = fullData return ret }
var TestingPrepareMessageWithHeight = func(sk *bls.SecretKey, id types.OperatorID, height qbft.Height) *qbft.SignedMessage { return TestingPrepareMessageWithParams(sk, id, qbft.FirstRound, height, TestingIdentifier, TestingQBFTRootData) }
var TestingPrepareMessageWithIdentifierAndRoot = func(sk *bls.SecretKey, id types.OperatorID, identifier []byte, root [32]byte) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.PrepareMsgType, Height: qbft.FirstHeight, Round: qbft.FirstRound, Identifier: identifier, Root: root, RoundChangeJustification: [][]byte{}, PrepareJustification: [][]byte{}, } ret := SignQBFTMsg(sk, id, msg) ret.FullData = []byte{} return ret }
var TestingPrepareMessageWithParams = func( sk *bls.SecretKey, id types.OperatorID, round qbft.Round, height qbft.Height, identifier []byte, root [32]byte, ) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.PrepareMsgType, Height: height, Round: round, Identifier: identifier, Root: root, } ret := SignQBFTMsg(sk, id, msg) ret.FullData = TestingQBFTFullData return ret }
var TestingPrepareMessageWithRound = func(sk *bls.SecretKey, id types.OperatorID, round qbft.Round) *qbft.SignedMessage { return TestingPrepareMessageWithParams(sk, id, round, qbft.FirstHeight, TestingIdentifier, TestingQBFTRootData) }
var TestingPrepareMessageWithRoundAndFullData = func( sk *bls.SecretKey, id types.OperatorID, round qbft.Round, fullData []byte, ) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.PrepareMsgType, Height: qbft.FirstHeight, Round: round, Identifier: TestingIdentifier, Root: sha256.Sum256(fullData), } ret := SignQBFTMsg(sk, id, msg) ret.FullData = fullData return ret }
var TestingPrepareMessageWrongRoot = func(sk *bls.SecretKey, id types.OperatorID) *qbft.SignedMessage { return TestingPrepareMessageWithParams(sk, id, qbft.FirstRound, qbft.FirstHeight, TestingIdentifier, DifferentRoot) }
var TestingPrepareMultiSignerMessage = func(sks []*bls.SecretKey, ids []types.OperatorID) *qbft.SignedMessage { return TestingPrepareMultiSignerMessageWithRound(sks, ids, qbft.FirstRound) }
var TestingPrepareMultiSignerMessageWithHeight = func(sks []*bls.SecretKey, ids []types.OperatorID, height qbft.Height) *qbft.SignedMessage { return TestingPrepareMultiSignerMessageWithParams(sks, ids, qbft.FirstRound, height, TestingIdentifier, TestingQBFTRootData) }
var TestingPrepareMultiSignerMessageWithHeightAndIdentifier = func(sks []*bls.SecretKey, ids []types.OperatorID, height qbft.Height, identifier []byte) *qbft.SignedMessage { return TestingPrepareMultiSignerMessageWithParams(sks, ids, qbft.FirstRound, height, identifier, TestingQBFTRootData) }
var TestingPrepareMultiSignerMessageWithParams = func(sks []*bls.SecretKey, ids []types.OperatorID, round qbft.Round, height qbft.Height, identifier []byte, root [32]byte) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.PrepareMsgType, Height: height, Round: round, Identifier: identifier, Root: root, } ret := MultiSignQBFTMsg(sks, ids, msg) ret.FullData = TestingQBFTFullData return ret }
var TestingPrepareMultiSignerMessageWithRound = func(sks []*bls.SecretKey, ids []types.OperatorID, round qbft.Round) *qbft.SignedMessage { return TestingPrepareMultiSignerMessageWithParams(sks, ids, round, qbft.FirstHeight, TestingIdentifier, TestingQBFTRootData) }
var TestingProposalMessage = func(sk *bls.SecretKey, id types.OperatorID) *qbft.SignedMessage { return TestingProposalMessageWithRound(sk, id, qbft.FirstRound) }
* Proposal messages
var TestingProposalMessageDifferentRoot = func(sk *bls.SecretKey, id types.OperatorID) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.ProposalMsgType, Height: qbft.FirstHeight, Round: qbft.FirstRound, Identifier: TestingIdentifier, Root: DifferentRoot, } ret := SignQBFTMsg(sk, id, msg) ret.FullData = DifferentFullData return ret }
var TestingProposalMessageWithHeight = func(sk *bls.SecretKey, id types.OperatorID, height qbft.Height) *qbft.SignedMessage { return TestingProposalMessageWithParams(sk, id, qbft.FirstRound, height, TestingQBFTRootData, nil, nil) }
var TestingProposalMessageWithID = func(sk *bls.SecretKey, id types.OperatorID, msgID types.MessageID) *qbft.SignedMessage { ret := TestingProposalMessageWithRound(sk, id, qbft.FirstRound) ret.Message.Identifier = msgID[:] ret.Signature = SignQBFTMsg(sk, id, &ret.Message).Signature return ret }
var TestingProposalMessageWithParams = func( sk *bls.SecretKey, id types.OperatorID, round qbft.Round, height qbft.Height, root [32]byte, roundChangeJustification [][]byte, prepareJustification [][]byte, ) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.ProposalMsgType, Height: height, Round: round, Identifier: TestingIdentifier, Root: root, RoundChangeJustification: roundChangeJustification, PrepareJustification: prepareJustification, } ret := SignQBFTMsg(sk, id, msg) ret.FullData = TestingQBFTFullData return ret }
var TestingProposalMessageWithRound = func(sk *bls.SecretKey, id types.OperatorID, round qbft.Round) *qbft.SignedMessage { return TestingProposalMessageWithParams(sk, id, round, qbft.FirstHeight, TestingQBFTRootData, nil, nil) }
var TestingProposalMessageWithRoundAndRC = func(sk *bls.SecretKey, id types.OperatorID, round qbft.Round, roundChangeJustification [][]byte) *qbft.SignedMessage { return TestingProposalMessageWithParams(sk, id, round, qbft.FirstHeight, TestingQBFTRootData, roundChangeJustification, nil) }
var TestingProposerDutyNextEpochV = func(version spec.DataVersion) *types.Duty { duty := &types.Duty{ Type: types.BNRoleProposer, PubKey: TestingValidatorPubKey, ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 3, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, } switch version { case spec.DataVersionBellatrix: duty.Slot = TestingDutySlotBellatrixNextEpoch case spec.DataVersionCapella: duty.Slot = TestingDutySlotCapellaNextEpoch default: panic("unsupported version") } return duty }
var TestingProposerDutyV = func(version spec.DataVersion) *types.Duty { duty := &types.Duty{ Type: types.BNRoleProposer, PubKey: TestingValidatorPubKey, Slot: TestingDutySlotV(version), ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 3, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, } return duty }
var TestingQBFTFullData = []byte{1, 2, 3, 4, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6, 7, 8, 9}
var TestingQBFTRootData = func() [32]byte { return sha256.Sum256(TestingQBFTFullData) }()
var TestingRoundChangeMessage = func(sk *bls.SecretKey, id types.OperatorID) *qbft.SignedMessage { return TestingRoundChangeMessageWithRound(sk, id, qbft.FirstRound) }
* Round Change messages
var TestingRoundChangeMessageWithHeight = func(sk *bls.SecretKey, id types.OperatorID, height qbft.Height) *qbft.SignedMessage { return TestingRoundChangeMessageWithParams(sk, id, qbft.FirstRound, height, TestingQBFTRootData, qbft.NoRound, nil) }
var TestingRoundChangeMessageWithHeightAndIdentifier = func(sk *bls.SecretKey, id types.OperatorID, height qbft.Height, identifier []byte) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.RoundChangeMsgType, Height: height, Round: qbft.FirstRound, Identifier: TestingIdentifier, Root: TestingQBFTRootData, } ret := SignQBFTMsg(sk, id, msg) ret.FullData = TestingQBFTFullData return ret }
var TestingRoundChangeMessageWithParams = func( sk *bls.SecretKey, id types.OperatorID, round qbft.Round, height qbft.Height, root [32]byte, dataRound qbft.Round, roundChangeJustification [][]byte, ) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.RoundChangeMsgType, Height: height, Round: round, Identifier: TestingIdentifier, Root: root, DataRound: dataRound, RoundChangeJustification: roundChangeJustification, } ret := SignQBFTMsg(sk, id, msg) ret.FullData = TestingQBFTFullData return ret }
var TestingRoundChangeMessageWithRound = func(sk *bls.SecretKey, id types.OperatorID, round qbft.Round) *qbft.SignedMessage { return TestingRoundChangeMessageWithParams(sk, id, round, qbft.FirstHeight, TestingQBFTRootData, qbft.NoRound, nil) }
var TestingRoundChangeMessageWithRoundAndFullData = func( sk *bls.SecretKey, id types.OperatorID, round qbft.Round, fullData []byte, ) *qbft.SignedMessage { msg := &qbft.Message{ MsgType: qbft.RoundChangeMsgType, Height: qbft.FirstHeight, Round: round, Identifier: TestingIdentifier, Root: sha256.Sum256(fullData), } ret := SignQBFTMsg(sk, id, msg) ret.FullData = fullData return ret }
var TestingRoundChangeMessageWithRoundAndHeight = func(sk *bls.SecretKey, id types.OperatorID, round qbft.Round, height qbft.Height) *qbft.SignedMessage { return TestingRoundChangeMessageWithParams(sk, id, round, height, TestingQBFTRootData, qbft.NoRound, nil) }
var TestingRoundChangeMessageWithRoundAndRC = func(sk *bls.SecretKey, id types.OperatorID, round qbft.Round, roundChangeJustification [][]byte) *qbft.SignedMessage { return TestingRoundChangeMessageWithParams(sk, id, round, qbft.FirstHeight, TestingQBFTRootData, qbft.FirstRound, roundChangeJustification) }
var TestingRoundChangeMessageWrongRoot = func(sk *bls.SecretKey, id types.OperatorID) *qbft.SignedMessage { return TestingRoundChangeMessageWithParams(sk, id, qbft.FirstRound, qbft.FirstHeight, DifferentRoot, qbft.NoRound, nil) }
var TestingSSVDomainType = types.V3Testnet
types.Share{ OperatorID: 1, ValidatorPubKey: keysSet.ValidatorPK.Serialize(), SharePubKey: keysSet.Shares[1].GetPublicKey().Serialize(), DomainType: TestingSSVDomainType, Quorum: keysSet.Threshold, PartialQuorum: keysSet.PartialThreshold, Committee: keysSet.Committee(), FeeRecipientAddress: TestingFeeRecipient, } }return &
var TestingSignedAggregateAndProof = func(ks *TestKeySet) *phase0.SignedAggregateAndProof { return &phase0.SignedAggregateAndProof{ Message: TestingAggregateAndProof, Signature: signBeaconObject(TestingAggregateAndProof, types.DomainAggregateAndProof, ks), } }
var TestingSignedAttestation = func(ks *TestKeySet) *phase0.Attestation { aggregationBitfield := bitfield.NewBitlist(TestingAttesterDuty.CommitteeLength) aggregationBitfield.SetBitAt(TestingAttesterDuty.ValidatorCommitteeIndex, true) return &phase0.Attestation{ Data: TestingAttestationData, Signature: signBeaconObject(TestingAttestationData, types.DomainAttester, ks), AggregationBits: aggregationBitfield, } }
var TestingSignedBeaconBlockV = func(ks *TestKeySet, version spec.DataVersion) ssz.HashRoot { vBlk := TestingBeaconBlockV(version) switch version { case spec.DataVersionBellatrix: if vBlk.Bellatrix == nil { panic("empty block") } return &bellatrix.SignedBeaconBlock{ Message: vBlk.Bellatrix, Signature: signBeaconObject(vBlk.Bellatrix, types.DomainProposer, ks), } case spec.DataVersionCapella: if vBlk.Capella == nil { panic("empty block") } return &capella.SignedBeaconBlock{ Message: vBlk.Capella, Signature: signBeaconObject(vBlk.Capella, types.DomainProposer, ks), } default: panic("unsupported version") } }
var TestingSignedSyncCommitteeBlockRoot = func(ks *TestKeySet) *altair.SyncCommitteeMessage { return &altair.SyncCommitteeMessage{ Slot: TestingDutySlot, BeaconBlockRoot: TestingSyncCommitteeBlockRoot, ValidatorIndex: TestingValidatorIndex, Signature: signBeaconObject(types.SSZBytes(TestingSyncCommitteeBlockRoot[:]), types.DomainSyncCommittee, ks), } }
var TestingSignedSyncCommitteeContributions = func( contrib *altair.SyncCommitteeContribution, proof phase0.BLSSignature, ks *TestKeySet) *altair.SignedContributionAndProof { msg := &altair.ContributionAndProof{ AggregatorIndex: TestingValidatorIndex, Contribution: contrib, SelectionProof: proof, } return &altair.SignedContributionAndProof{ Message: msg, Signature: signBeaconObject(msg, types.DomainContributionAndProof, ks), } }
var TestingSignedVoluntaryExit = func(ks *TestKeySet) *phase0.SignedVoluntaryExit { return &phase0.SignedVoluntaryExit{ Message: TestingVoluntaryExit, Signature: signBeaconObject(TestingVoluntaryExit, types.DomainVoluntaryExit, ks), } }
var TestingSyncCommitteeBlockRoot = phase0.Root{2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2, 2}
var TestingSyncCommitteeContributionDuty = types.Duty{ Type: types.BNRoleSyncCommitteeContribution, PubKey: TestingValidatorPubKey, Slot: TestingDutySlot, ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 3, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, ValidatorSyncCommitteeIndices: TestingContributionProofIndexes, }
var TestingSyncCommitteeContributionNexEpochDuty = types.Duty{ Type: types.BNRoleSyncCommitteeContribution, PubKey: TestingValidatorPubKey, Slot: TestingDutySlot2, ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 3, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, ValidatorSyncCommitteeIndices: TestingContributionProofIndexes, }
TestingSyncCommitteeContributionNexEpochDuty testing for a second duty start
var TestingSyncCommitteeContributions = []*altair.SyncCommitteeContribution{ { Slot: TestingDutySlot, BeaconBlockRoot: TestingSyncCommitteeBlockRoot, SubcommitteeIndex: 0, AggregationBits: bitfield.NewBitvector128(), Signature: phase0.BLSSignature{}, }, { Slot: TestingDutySlot, BeaconBlockRoot: TestingSyncCommitteeBlockRoot, SubcommitteeIndex: 1, AggregationBits: bitfield.NewBitvector128(), Signature: phase0.BLSSignature{}, }, { Slot: TestingDutySlot, BeaconBlockRoot: TestingSyncCommitteeBlockRoot, SubcommitteeIndex: 2, AggregationBits: bitfield.NewBitvector128(), Signature: phase0.BLSSignature{}, }, }
var TestingSyncCommitteeDuty = types.Duty{ Type: types.BNRoleSyncCommittee, PubKey: TestingValidatorPubKey, Slot: TestingDutySlot, ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 3, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, ValidatorSyncCommitteeIndices: TestingContributionProofIndexes, }
var TestingSyncCommitteeDutyNextEpoch = types.Duty{ Type: types.BNRoleSyncCommittee, PubKey: TestingValidatorPubKey, Slot: TestingDutySlot2, ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 3, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, ValidatorSyncCommitteeIndices: TestingContributionProofIndexes, }
var TestingSyncCommitteeWrongBlockRoot = phase0.Root{1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1}
var TestingUnknownDutyType = types.Duty{ Type: UnknownDutyType, PubKey: TestingValidatorPubKey, Slot: 12, ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 22, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, }
var TestingValidatorPubKey = func() spec.BLSPubKey { pk, _ := hex.DecodeString("8e80066551a81b318258709edaf7dd1f63cd686a0e4db8b29bbb7acfe65608677af5a527d9448ee47835485e02b50bc0") blsPK := spec.BLSPubKey{} copy(blsPK[:], pk) return blsPK }()
var TestingValidatorRegistration = &v1.ValidatorRegistration{ FeeRecipient: TestingFeeRecipient, GasLimit: types.DefaultGasLimit, Timestamp: types.PraterNetwork.EpochStartTime(TestingDutyEpoch), Pubkey: TestingValidatorPubKey, }
var TestingValidatorRegistrationDuty = types.Duty{ Type: types.BNRoleValidatorRegistration, PubKey: TestingValidatorPubKey, Slot: TestingDutySlot, ValidatorIndex: TestingValidatorIndex, }
var TestingValidatorRegistrationWrong = &v1.ValidatorRegistration{ FeeRecipient: TestingFeeRecipient, GasLimit: 5, Timestamp: types.PraterNetwork.EpochStartTime(TestingDutyEpoch), Pubkey: TestingValidatorPubKey, }
var TestingVoluntaryExit = &phase0.VoluntaryExit{ Epoch: 0, ValidatorIndex: TestingValidatorIndex, }
var TestingVoluntaryExitDuty = types.Duty{ Type: types.BNRoleVoluntaryExit, PubKey: TestingValidatorPubKey, Slot: TestingDutySlot, ValidatorIndex: TestingValidatorIndex, }
var TestingVoluntaryExitWrong = &phase0.VoluntaryExit{ Epoch: 1, ValidatorIndex: TestingValidatorIndex, }
var TestingWrongAggregateAndProof = func() *phase0.AggregateAndProof { byts, err := TestingAggregateAndProof.MarshalSSZ() if err != nil { panic(err.Error()) } ret := &phase0.AggregateAndProof{} if err := ret.UnmarshalSSZ(byts); err != nil { panic(err.Error()) } ret.AggregatorIndex = 100 return ret }()
var TestingWrongAttestationData = func() *phase0.AttestationData { byts, _ := TestingAttestationData.MarshalSSZ() ret := &phase0.AttestationData{} if err := ret.UnmarshalSSZ(byts); err != nil { panic(err.Error()) } ret.Slot = 100 return ret }()
var TestingWrongBeaconBlockV = func(version spec.DataVersion) *spec.VersionedBeaconBlock { blkByts := TestingBeaconBlockBytesV(version) switch version { case spec.DataVersionBellatrix: ret := &bellatrix.BeaconBlock{} if err := ret.UnmarshalSSZ(blkByts); err != nil { panic(err.Error()) } ret.Slot = 100 return &spec.VersionedBeaconBlock{ Version: version, Bellatrix: ret, } case spec.DataVersionCapella: ret := &capella.BeaconBlock{} if err := ret.UnmarshalSSZ(blkByts); err != nil { panic(err.Error()) } ret.Slot = TestingDutySlotCapella + 100 return &spec.VersionedBeaconBlock{ Version: version, Capella: ret, } default: panic("unsupported version") } }
var TestingWrongDutyPK = types.Duty{ Type: types.BNRoleAttester, PubKey: TestingWrongValidatorPubKey, Slot: 12, ValidatorIndex: TestingValidatorIndex, CommitteeIndex: 3, CommitteesAtSlot: 36, CommitteeLength: 128, ValidatorCommitteeIndex: 11, }
var TestingWrongValidatorPubKey = func() spec.BLSPubKey { pk, _ := hex.DecodeString("948fb44582ce25336fdb17122eac64fe5a1afc39174ce92d6013becac116766dc5a778c880dd47de7dfff6a0f86ba42b") blsPK := spec.BLSPubKey{} copy(blsPK[:], pk) return blsPK }()
var ThirteenOperatorsInstance = func() *qbft.Instance { return baseInstance(TestingShare(Testing13SharesSet()), Testing13SharesSet(), []byte{1, 2, 3, 4}) }
var Transactions = func() []bellatrix.Transaction { data := []byte(`{parent_hash: '0x17f4eeae822cc81533016678413443b95e34517e67f12b4a3a92ff6b66f972ef', fee_recipient: '0x58e809c71e4885cb7b3f1d5c793ab04ed239d779', state_root: '0x3d6e230e6eceb8f3db582777b1500b8b31b9d268339e7b32bba8d6f1311b211d', receipts_root: '0xea760203509bdde017a506b12c825976d12b04db7bce9eca9e1ed007056a3f36', logs_bloom: '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', prev_randao: '0x76ff751467270668df463600d26dba58297a986e649bac84ea856712d4779c00', block_number: 2983837628677007840, gas_limit: 6738255228996962210, gas_used: 5573520557770513197, timestamp: 1744720080366521389, extra_data: '0xc648', base_fee_per_gas: '88770397543877639215846057887940126737648744594802753726778414602657613619599', block_hash: '0x42c294e902bfc9884c1ce5fef156d4661bb8f0ff488bface37f18c3e7be64b0f', transactions: ['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', '0x4b5edff58cf95969ead0470ab897da6c9d69b517e07fd4ed8fa48c14284a5a060ecb745f66cf1be55fb4905d62d8d376865f7d2d1816844fc4719f5d79ab905474d00f62aed6692e5a93be1b32740a8083fc2a61b0e1fc13ad409410d37f3cb0a5275c966abab015047c15251cd301cd31a7b2a0502f7f953e672d61606616b16d5117163064fb33d97eb566f7fce5f01d3833343c1c97e6221f9f0798415f3a4b87fd472e53a24c1a101e1dd55c8f65c2c0f4ccc4b46a133fda49db5dba96631b4cfd1a05662e42a8e15a26d3148a70be305c85f87dae4217fb91498c4098b946a9042355968b765e2e62bb0cf26d59e534c3af8795fa0f4a44ed0d39d258acd934c3416e4d4a738eaa473526d99bee037765d5f6034c830eb766ef067a1468630fbb65b7c5a862017fe84d4d1961f90c37f18a4bd2509fe2e96cb1e26971900e20295c8a9e9ed77b348d4509a8425090318be5c9d2bcda36bdfabb71bfb36755794f78c877df2825bd736a358933af77eae6edf701ed7ef168f57f677df3445d89c5eefc783184eadd3886fcfd75f5f142bc10904a019acdf7861caa7e0fba3e7831b0a549a56c0f174e80cffb8992346ddf7ce4eeff9e335531df3dff57d5f539bc0d3eac57f70a8f973e0864c87b25c3e0bea72e05eda8a120178186dfbfaa9a00f904f23a', '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', '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', '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', '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', '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', '0x2b2acf1e7e043b2c38ea1750a6c31f174b0a8b00137ec3eea24ed9fdf979bf04ed923a2cf5cc05a9acf697d27ccdb2a903a4846729cd9b2eead414da983d4f5bfd0ff4f2e7eb75988e58c3a635c271', '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', '0x9ced04a51e77ed0730f3420571164ea5247a670b962ebf6b453660748ca5']}`) var res bellatrix.ExecutionPayload if err := yaml.Unmarshal(data, &res); err != nil { panic(err.Error()) } return res.Transactions }()
var UnknownDutyTypeRunner = func(keySet *TestKeySet) ssv.Runner { return baseRunner(UnknownDutyType, UnknownDutyValueCheck(), keySet) }
var ValidatorRegistrationMsgID = func() []byte { ret := types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleValidatorRegistration) return ret[:] }()
var ValidatorRegistrationRunner = func(keySet *TestKeySet) ssv.Runner { return baseRunner(types.BNRoleValidatorRegistration, nil, keySet) }
var VersionBySlot = func(slot phase0.Slot) spec.DataVersion { if slot < ForkEpochPraterCapella*32 { return spec.DataVersionBellatrix } return spec.DataVersionCapella }
var VoluntaryExitMsg = func( sk, beaconSK *bls.SecretKey, id, beaconID types.OperatorID, msgCnt int, wrongRoot bool, epoch phase0.Epoch, wrongBeaconSig bool, ) *types.SignedPartialSignatureMessage { signer := NewTestingKeyManager() beacon := NewTestingBeaconNode() d, _ := beacon.DomainData(epoch, types.DomainVoluntaryExit) signed, root, _ := signer.SignBeaconObject(TestingVoluntaryExit, d, beaconSK.GetPublicKey().Serialize(), types.DomainVoluntaryExit) if wrongRoot { signed, root, _ = signer.SignBeaconObject(TestingVoluntaryExitWrong, d, beaconSK.GetPublicKey().Serialize(), types.DomainVoluntaryExit) } if wrongBeaconSig { signed, root, _ = signer.SignBeaconObject(TestingVoluntaryExit, d, Testing7SharesSet().ValidatorPK.Serialize(), types.DomainVoluntaryExit) } msgs := types.PartialSignatureMessages{ Type: types.VoluntaryExitPartialSig, Slot: TestingDutySlot, Messages: []*types.PartialSignatureMessage{}, } for i := 0; i < msgCnt; i++ { msg := &types.PartialSignatureMessage{ PartialSignature: signed[:], SigningRoot: root, Signer: beaconID, } msgs.Messages = append(msgs.Messages, msg) } msg := &types.PartialSignatureMessage{ PartialSignature: signed[:], SigningRoot: root, Signer: id, } if wrongRoot { msg.SigningRoot = [32]byte{} } sig, _ := signer.SignRoot(msgs, types.PartialSignatureType, sk.GetPublicKey().Serialize()) return &types.SignedPartialSignatureMessage{ Message: msgs, Signature: sig, Signer: id, } }
var VoluntaryExitMsgID = func() []byte { ret := types.NewMsgID(TestingSSVDomainType, TestingValidatorPubKey[:], types.BNRoleVoluntaryExit) return ret[:] }()
var VoluntaryExitRunner = func(keySet *TestKeySet) ssv.Runner { return baseRunner(types.BNRoleVoluntaryExit, nil, keySet) }
Functions ¶
func GetSSZRootNoError ¶ added in v0.3.1
func NewTestingKeyManager ¶
func NewTestingKeyManager() *testingKeyManager
func NewTestingKeyManagerWithSlashableRoots ¶ added in v0.2.7
func NewTestingKeyManagerWithSlashableRoots(slashableDataRoots [][]byte) *testingKeyManager
func NewTestingStorage ¶
func NewTestingStorage() *testingStorage
func NewTestingTimer ¶
func TestingCommitMessageWithHeightIdentifierAndFullData ¶ added in v0.3.1
func TestingCommitMessageWithHeightIdentifierAndFullData(sk *bls.SecretKey, id types.OperatorID, height qbft.Height, identifier, fullData []byte) *qbft.SignedMessage
func TestingCommitMultiSignerMessageWithHeightIdentifierAndFullData ¶ added in v0.3.1
func TestingCommitMultiSignerMessageWithHeightIdentifierAndFullData( sks []*bls.SecretKey, ids []types.OperatorID, height qbft.Height, identifier, fullData []byte, ) *qbft.SignedMessage
func TestingProposalMessageWithIdentifierAndFullData ¶ added in v0.3.0
func TestingProposalMessageWithIdentifierAndFullData(sk *bls.SecretKey, id types.OperatorID, identifier, fullData []byte, height qbft.Height) *qbft.SignedMessage
func UnknownDutyValueCheck ¶ added in v0.2.7
func UnknownDutyValueCheck() qbft.ProposedValueCheckF
Types ¶
type TestKeySet ¶
func KeySetForShare ¶ added in v0.2.7
func KeySetForShare(share *types.Share) *TestKeySet
func Testing10SharesSet ¶
func Testing10SharesSet() *TestKeySet
func Testing13SharesSet ¶
func Testing13SharesSet() *TestKeySet
func Testing4SharesSet ¶
func Testing4SharesSet() *TestKeySet
func Testing7SharesSet ¶
func Testing7SharesSet() *TestKeySet
func (*TestKeySet) Committee ¶
func (ks *TestKeySet) Committee() []*types.Operator
type TestQBFTTimer ¶
type TestQBFTTimer struct {
State TimerState
}
func (*TestQBFTTimer) TimeoutForRound ¶
func (t *TestQBFTTimer) TimeoutForRound(round qbft.Round)
type TestingBeaconNode ¶ added in v0.2.7
type TestingBeaconNode struct { BroadcastedRoots []phase0.Root // contains filtered or unexported fields }
func NewTestingBeaconNode ¶
func NewTestingBeaconNode() *TestingBeaconNode
func (*TestingBeaconNode) DomainData ¶ added in v0.2.7
func (bn *TestingBeaconNode) DomainData(epoch phase0.Epoch, domain phase0.DomainType) (phase0.Domain, error)
func (*TestingBeaconNode) GetAttestationData ¶ added in v0.2.7
func (bn *TestingBeaconNode) GetAttestationData(slot phase0.Slot, committeeIndex phase0.CommitteeIndex) (ssz.Marshaler, spec.DataVersion, error)
GetAttestationData returns attestation data by the given slot and committee index
func (*TestingBeaconNode) GetBeaconBlock ¶ added in v0.2.7
func (bn *TestingBeaconNode) GetBeaconBlock(slot phase0.Slot, graffiti, randao []byte) (ssz.Marshaler, spec.DataVersion, error)
GetBeaconBlock returns beacon block by the given slot, graffiti, and randao.
func (*TestingBeaconNode) GetBeaconNetwork ¶ added in v0.2.7
func (bn *TestingBeaconNode) GetBeaconNetwork() types.BeaconNetwork
GetBeaconNetwork returns the beacon network the node is on
func (*TestingBeaconNode) GetBlindedBeaconBlock ¶ added in v0.3.0
func (bn *TestingBeaconNode) GetBlindedBeaconBlock(slot phase0.Slot, graffiti, randao []byte) (ssz.Marshaler, spec.DataVersion, error)
GetBlindedBeaconBlock returns blinded beacon block by the given slot, graffiti, and randao.
func (*TestingBeaconNode) GetSyncCommitteeContribution ¶ added in v0.2.7
func (bn *TestingBeaconNode) GetSyncCommitteeContribution(slot phase0.Slot, selectionProofs []phase0.BLSSignature, subnetIDs []uint64) (ssz.Marshaler, spec.DataVersion, error)
GetSyncCommitteeContribution returns
func (*TestingBeaconNode) GetSyncMessageBlockRoot ¶ added in v0.2.7
func (bn *TestingBeaconNode) GetSyncMessageBlockRoot(slot phase0.Slot) (phase0.Root, spec.DataVersion, error)
GetSyncMessageBlockRoot returns beacon block root for sync committee
func (*TestingBeaconNode) IsSyncCommitteeAggregator ¶ added in v0.2.7
func (bn *TestingBeaconNode) IsSyncCommitteeAggregator(proof []byte) (bool, error)
IsSyncCommitteeAggregator returns tru if aggregator
func (*TestingBeaconNode) SetSyncCommitteeAggregatorRootHexes ¶ added in v0.2.7
func (bn *TestingBeaconNode) SetSyncCommitteeAggregatorRootHexes(roots map[string]bool)
SetSyncCommitteeAggregatorRootHexes FOR TESTING ONLY!! sets which sync committee aggregator roots will return true for aggregator
func (*TestingBeaconNode) SubmitAggregateSelectionProof ¶ added in v0.2.7
func (bn *TestingBeaconNode) SubmitAggregateSelectionProof(slot phase0.Slot, committeeIndex phase0.CommitteeIndex, committeeLength uint64, index phase0.ValidatorIndex, slotSig []byte) (ssz.Marshaler, spec.DataVersion, error)
SubmitAggregateSelectionProof returns an AggregateAndProof object
func (*TestingBeaconNode) SubmitAttestation ¶ added in v0.2.7
func (bn *TestingBeaconNode) SubmitAttestation(attestation *phase0.Attestation) error
SubmitAttestation submit the attestation to the node
func (*TestingBeaconNode) SubmitBeaconBlock ¶ added in v0.2.7
func (bn *TestingBeaconNode) SubmitBeaconBlock(block *spec.VersionedBeaconBlock, sig phase0.BLSSignature) error
SubmitBeaconBlock submit the block to the node
func (*TestingBeaconNode) SubmitBlindedBeaconBlock ¶ added in v0.3.0
func (bn *TestingBeaconNode) SubmitBlindedBeaconBlock(block *api.VersionedBlindedBeaconBlock, sig phase0.BLSSignature) error
SubmitBlindedBeaconBlock submit the blinded block to the node
func (*TestingBeaconNode) SubmitSignedAggregateSelectionProof ¶ added in v0.2.7
func (bn *TestingBeaconNode) SubmitSignedAggregateSelectionProof(msg *phase0.SignedAggregateAndProof) error
SubmitSignedAggregateSelectionProof broadcasts a signed aggregator msg
func (*TestingBeaconNode) SubmitSignedContributionAndProof ¶ added in v0.2.7
func (bn *TestingBeaconNode) SubmitSignedContributionAndProof(contribution *altair.SignedContributionAndProof) error
SubmitSignedContributionAndProof broadcasts to the network
func (*TestingBeaconNode) SubmitSyncMessage ¶ added in v0.2.7
func (bn *TestingBeaconNode) SubmitSyncMessage(msg *altair.SyncCommitteeMessage) error
SubmitSyncMessage submits a signed sync committee msg
func (*TestingBeaconNode) SubmitValidatorRegistration ¶ added in v0.3.1
func (bn *TestingBeaconNode) SubmitValidatorRegistration(pubkey []byte, feeRecipient bellatrix.ExecutionAddress, sig phase0.BLSSignature) error
func (*TestingBeaconNode) SubmitVoluntaryExit ¶ added in v0.3.2
func (bn *TestingBeaconNode) SubmitVoluntaryExit(voluntaryExit *phase0.SignedVoluntaryExit, sig phase0.BLSSignature) error
SubmitVoluntaryExit submit the VoluntaryExit object to the node
func (*TestingBeaconNode) SyncCommitteeSubnetID ¶ added in v0.2.7
func (bn *TestingBeaconNode) SyncCommitteeSubnetID(index phase0.CommitteeIndex) (uint64, error)
SyncCommitteeSubnetID returns sync committee subnet ID from subcommittee index
type TestingNetwork ¶
type TestingNetwork struct {
BroadcastedMsgs []*types.SSVMessage
}
func NewTestingNetwork ¶
func NewTestingNetwork() *TestingNetwork
func (*TestingNetwork) Broadcast ¶
func (net *TestingNetwork) Broadcast(message *types.SSVMessage) error